Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-1671

Publication date:
04/04/2023
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2023-1827

Publication date:
04/04/2023
A vulnerability has been found in SourceCodester Centralized Covid Vaccination Records System 1.0 and classified as critical. This vulnerability affects unknown code of the file /vaccinated/admin/maintenance/manage_location.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224842 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2020-36692

Publication date:
04/04/2023
A reflected XSS via POST vulnerability in report scheduler of Sophos Web Appliance versions older than 4.3.10.4 allows execution of JavaScript code in the victim browser via a malicious form that must be manually submitted by the victim while logged in to SWA.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2022-4934

Publication date:
04/04/2023
A post-auth command injection vulnerability in the exception wizard of Sophos Web Appliance older than version 4.3.10.4 allows administrators to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2023-1728

Publication date:
04/04/2023
Unrestricted Upload of File with Dangerous Type vulnerability in Fernus Informatics LMS allows OS Command Injection, Server Side Include (SSI) Injection.This issue affects LMS: before 23.04.03.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2023

CVE-2023-1826

Publication date:
04/04/2023
A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file php-ocls\admin\system_info\index.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-224841 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-1768

Publication date:
04/04/2023
Inappropriate error handling in Tribe29 Checkmk
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2024

CVE-2023-26855

Publication date:
04/04/2023
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-26976

Publication date:
04/04/2023
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-0922

Publication date:
03/04/2023
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-1579

Publication date:
03/04/2023
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-0225

Publication date:
03/04/2023
A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2025