Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-3724

Publication date:
17/07/2023
If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. wolfSSL recommends that TLS 1.3 client side users update the version of wolfSSL used. <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-38403

Publication date:
17/07/2023
iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2024

CVE-2021-37384

Publication date:
17/07/2023
RCE (Remote Code Execution) vulnerability was found in some Furukawa ONU models, this vulnerability allows remote unauthenticated users to send arbitrary commands to the device via web interface.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2023-38405

Publication date:
17/07/2023
On Crestron 3-Series Control Systems before 1.8001.0187, crafting and sending a specific BACnet packet can cause a crash.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2023-37266

Publication date:
17/07/2023
CasaOS is an open-source Personal Cloud system. Unauthenticated attackers can craft arbitrary JWTs and access features that usually require authentication and execute arbitrary commands as `root` on CasaOS instances. This problem was addressed by improving the validation of JWTs in commit `705bf1f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can&amp;#39;t, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2023-37265

Publication date:
17/07/2023
CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can&amp;#39;t, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2023-38404

Publication date:
17/07/2023
The XPRTLD web application in Veritas InfoScale Operations Manager (VIOM) before 8.0.0.410 allows an authenticated attacker to upload all types of files to the server. An authenticated attacker can then execute the malicious file to perform command execution on the remote server.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-37461

Publication date:
17/07/2023
Metersphere is an opensource testing framework. Files uploaded to Metersphere may define a `belongType` value with a relative path like `../../../../` which may cause metersphere to attempt to overwrite an existing file in the defined location or to create a new file. Attackers would be limited to overwriting files that the metersphere process has access to. This issue has been addressed in version 2.10.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-28864

Publication date:
17/07/2023
Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-37770

Publication date:
17/07/2023
faust commit ee39a19 was discovered to contain a stack overflow via the component boxppShared::print() at /boxes/ppbox.cpp.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-37769

Publication date:
17/07/2023
stress-test master commit e4c878 was discovered to contain a FPE vulnerability via the component combine_inner at /pixman-combine-float.c.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-37781

Publication date:
17/07/2023
An issue in the emqx_sn plugin of EMQX v4.3.8 allows attackers to execute a directory traversal via uploading a crafted .txt file.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023