Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22386

Publication date:
17/10/2023
<br /> IBM Security Verify Privilege On-Premises 11.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 221963.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2022-43889

Publication date:
17/10/2023
<br /> IBM Security Verify Privilege On-Premises 11.5 could disclose sensitive information through an HTTP request that could aid an attacker in further attacks against the system. IBM X-Force ID: 240452.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2022-43893

Publication date:
17/10/2023
<br /> IBM Security Verify Privilege On-Premises 11.5 could allow a privileged user to cause by using a malicious payload. IBM X-Force ID: 240634.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2021-20581

Publication date:
17/10/2023
<br /> IBM Security Verify Privilege On-Premises 11.5 could allow a user to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 199324.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2021-29913

Publication date:
17/10/2023
<br /> IBM Security Verify Privilege On-Premise 11.5 could allow an authenticated user to obtain sensitive information or perform unauthorized actions due to improper input validation. IBM X-Force ID: 207898.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2022-22377

Publication date:
17/10/2023
IBM Security Verify Privilege On-Premises 11.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 221827.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2022-22384

Publication date:
17/10/2023
<br /> IBM Security Verify Privilege On-Premises 11.5 could allow an attacker to modify messages returned from the server due to hazardous input validation. IBM X-Force ID: 221961.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-45152

Publication date:
17/10/2023
Engelsystem is a shift planning system for chaos events. A Blind SSRF in the "Import schedule" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2023

CVE-2023-45659

Publication date:
17/10/2023
Engelsystem is a shift planning system for chaos events. If a users&amp;#39; password is compromised and an attacker gained access to a users&amp;#39; account, i.e., logged in and obtained a session, an attackers&amp;#39; session is not terminated if the users&amp;#39; account password is reset. This vulnerability has been fixed in the commit `dbb089315ff3d`. Users are advised to update their installations. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2023

CVE-2023-4215

Publication date:
17/10/2023
Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2024

CVE-2011-10004

Publication date:
17/10/2023
A vulnerability was found in reciply Plugin up to 1.1.7 on WordPress. It has been rated as critical. This issue affects some unknown processing of the file uploadImage.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The identifier of the patch is e3ff616dc08d3aadff9253f1085e13f677d0c676. It is recommended to upgrade the affected component. The identifier VDB-242189 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2012-10016

Publication date:
17/10/2023
A vulnerability classified as problematic has been found in Halulu simple-download-button-shortcode Plugin 1.0 on WordPress. Affected is an unknown function of the file simple-download-button_dl.php of the component Download Handler. The manipulation of the argument file leads to information disclosure. It is possible to launch the attack remotely. Upgrading to version 1.1 is able to address this issue. The patch is identified as e648a8706818297cf02a665ae0bae1c069dea5f1. It is recommended to upgrade the affected component. VDB-242190 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024