Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-0351

Publication date:
13/03/2023
The Akuvox E11 web server backend library allows command injection in the device phone-book contacts functionality. This could allow an attacker to upload files with executable command instructions.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0350

Publication date:
13/03/2023
Akuvox E11 does not ensure that a file extension is associated with the file provided. This could allow an attacker to upload a file to the device by changing the extension of a malicious file to an accepted file type.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0349

Publication date:
13/03/2023
The Akuvox E11 libvoice library provides unauthenticated access to the camera capture for image and video. This could allow an attacker to view and record image and video from the camera.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0348

Publication date:
13/03/2023
Akuvox E11 allows direct SIP calls. No access control is enforced by the SIP servers, which could allow an attacker to contact any device within Akuvox to call any other device.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0347

Publication date:
13/03/2023
The Akuvox E11 Media Access Control (MAC) address, a primary identifier, combined with the Akuvox E11 IP address, could allow an attacker to identify the device on the Akuvox cloud.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0346

Publication date:
13/03/2023
Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device if known.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24368

Publication date:
13/03/2023
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-25803

Publication date:
13/03/2023
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a directory traversal vulnerability that allows the inclusion of server-side files. This issue is fixed in version 6.3.5.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2023

CVE-2023-25802

Publication date:
13/03/2023
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a server. Version 6.3.6.0 has a patch for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2023

CVE-2023-0355

Publication date:
13/03/2023
Akuvox E11 uses a hard-coded cryptographic key, which could allow an attacker to decrypt sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-25207

Publication date:
13/03/2023
PrestaShop dpdfrance
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2025

CVE-2022-37941

Publication date:
13/03/2023
Rejected reason: Not used in 2022
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023