Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-25754

Publication date:
08/05/2023
Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.6.0.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-29247

Publication date:
08/05/2023
Task instance details page in the UI is vulnerable to a stored XSS.This issue affects Apache Airflow: before 2.6.0.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2023

CVE-2023-31039

Publication date:
08/05/2023
Security vulnerability in Apache bRPC = 1.5.0, download link:  https://dist.apache.org/repos/dist/release/brpc/1.5.0/ https://dist.apache.org/repos/dist/release/brpc/1.5.0/ <br /> 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2024

CVE-2023-31038

Publication date:
08/05/2023
SQL injection in Log4cxx when using the ODBC appender to send log messages to a database.  No fields sent to the database were properly escaped for SQL injection.  This has been the case since at least version 0.9.0(released 2003-08-06)<br /> <br /> <br /> <br /> <br /> Note that Log4cxx is a C++ framework, so only C++ applications are affected.<br /> <br /> Before version 1.1.0, the ODBC appender was automatically part of Log4cxx if the library was found when compiling the library.  As of version 1.1.0, this must be both explicitly enabled in order to be compiled in.<br /> <br /> <br /> <br /> <br /> Three preconditions must be met for this vulnerability to be possible:<br /> <br /> 1. Log4cxx compiled with ODBC support(before version 1.1.0, this was auto-detected at compile time)<br /> <br /> 2. ODBCAppender enabled for logging messages to, generally done via a config file<br /> <br /> 3. User input is logged at some point. If your application does not have user input, it is unlikely to be affected.<br /> <br /> <br /> <br /> <br /> <br /> Users are recommended to upgrade to version 1.1.0 which properly binds the parameters to the SQL statement, or migrate to the new DBAppender class which supports an ODBC connection in addition to other databases. <br /> Note that this fix does require a configuration file update, as the old configuration files will not configure properly.  An example is shown below, and more information may be found in the Log4cxx documentation on the ODBCAppender.<br /> <br /> <br /> <br /> <br /> <br /> Example of old configuration snippet:<br /> <br /> <br /> <br />     <br /> <br />     ... other params here ...<br /> <br /> <br /> <br /> <br /> <br /> <br /> The migrated configuration snippet with new ColumnMapping parameters:<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />     <br /> <br />     <br />     ... other params here ...<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2024

CVE-2023-2534

Publication date:
08/05/2023
Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via<br /> ticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data). Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation<br /> and the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2023

CVE-2023-2566

Publication date:
08/05/2023
Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2023

CVE-2023-30018

Publication date:
08/05/2023
Judging Management System v1.0 is vulnerable to SQL Injection. via /php-jms/review_se_result.php?mainevent_id=.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-29944

Publication date:
08/05/2023
Metersphere v1.20.20-lts-79d354a6 is vulnerable to Remote Command Execution. The system command reverse-shell can be executed at the custom code snippet function of the metersphere system workbench
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-30185

Publication date:
08/05/2023
CRMEB v4.4 to v4.6 was discovered to contain an arbitrary file upload vulnerability via the component \attachment\SystemAttachmentServices.php.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-30257

Publication date:
08/05/2023
A buffer overflow in the component /proc/ftxxxx-debug of FiiO M6 Build Number v1.0.4 allows attackers to escalate privileges to root.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-2565

Publication date:
07/05/2023
A vulnerability has been found in SourceCodester Multi Language Hotel Management Software 1.0 and classified as problematic. This vulnerability affects unknown code of the file ajax.php of the component POST Parameter Handler. The manipulation of the argument complaint_type with the input alert(document.cookie) leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228172.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-2564

Publication date:
07/05/2023
OS Command Injection in GitHub repository sbs20/scanservjs prior to v2.27.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023