Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-36250

Publication date:
14/09/2023
CSV Injection vulnerability in GNOME time tracker version 3.0.2, allows local attackers to execute arbitrary code via crafted .tsv file when creating a new record.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-42180

Publication date:
14/09/2023
An arbitrary file upload vulnerability in the /user/upload component of lenosp 1.0-1.2.0 allows attackers to execute html code via a crafted JPG file.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2023

CVE-2023-42178

Publication date:
14/09/2023
Lenosp 1.0.0-1.2.0 is vulnerable to SQL Injection via the log query module.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2023-1108

Publication date:
14/09/2023
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2024

CVE-2023-30909

Publication date:
14/09/2023
A remote authentication bypass issue exists in some<br /> OneView APIs.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2024

CVE-2021-28485

Publication date:
14/09/2023
In Ericsson Mobile Switching Center Server (MSC-S) before IS 3.1 CP22, the SIS web application allows relative path traversal via a specific parameter in the https request after authentication, which allows access to files on the system that are not intended to be accessible via the web application.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2023-2848

Publication date:
14/09/2023
Movim prior to version 0.22 is affected by a Cross-Site WebSocket Hijacking vulnerability. This was the result of a missing header validation.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-38557

Publication date:
14/09/2023
A vulnerability has been identified in Spectrum Power 7 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2023

CVE-2023-38558

Publication date:
14/09/2023
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-4516

Publication date:
14/09/2023
<br /> A CWE-306: Missing Authentication for Critical Function vulnerability exists in the IGSS Update<br /> Service that could allow a local attacker to change update source, potentially leading to remote<br /> code execution when the attacker force an update containing malicious content.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-42503

Publication date:
14/09/2023
Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.This issue affects Apache Commons Compress: from 1.22 before 1.24.0.<br /> <br /> Users are recommended to upgrade to version 1.24.0, which fixes the issue.<br /> <br /> A third party can create a malformed TAR file by manipulating file modification times headers, which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption.<br /> <br /> In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision (issue # COMPRESS-612 [1]). The format for the PAX extended headers carrying this data consists of two numbers separated by a period [2], indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and “LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values.<br /> <br /> Parsing of these numbers uses the BigDecimal [3] class from the JDK which has a publicly known algorithmic complexity issue when doing operations on large numbers, causing denial of service (see issue # JDK-6560193 [4]). A third party can manipulate file time headers in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”) within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098 [5].<br /> <br /> [1]: https://issues.apache.org/jira/browse/COMPRESS-612 <br /> [2]: https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05 <br /> [3]: https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html <br /> [4]: https://bugs.openjdk.org/browse/JDK-6560193 <br /> [5]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098 <br /> <br /> Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-38204

Publication date:
14/09/2023
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2023