Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-27510

Publication date:
10/05/2023
JB Inquiry form contains an exposure of private personal information to an unauthorized actor vulnerability, which may allow a remote unauthenticated attacker to obtain information entered from forms created using the affected product. The affected products and versions are as follows: JB Inquiry form versions 0.6.1 and 0.6.0, JB Inquiry form versions 0.5.2, 0.5.1 and 0.5.0, and JB Inquiry form version 0.40.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-25072

Publication date:
10/05/2023
Use of weak credentials exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-25184

Publication date:
10/05/2023
Use of weak credentials exists in Seiko Solutions SkyBridge and SkySpider series, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-27385

Publication date:
10/05/2023
Heap-based buffer overflow vulnerability exists in CX-Drive All models all versions. By having a user open a specially crafted SDD file, arbitrary code may be executed and/or information may be disclosed.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-24586

Publication date:
10/05/2023
Cleartext storage of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote authenticated attacker to obtain an APN credential for the product.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-25070

Publication date:
10/05/2023
Cleartext transmission of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier. If the telnet connection is enabled, a remote unauthenticated attacker may eavesdrop on or alter the administrator&amp;#39;s communication to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-23906

Publication date:
10/05/2023
Missing authentication for critical function exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to execute some critical functions without authentication, e.g., rebooting the product.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-22441

Publication date:
10/05/2023
Missing authentication for critical function exists in Seiko Solutions SkyBridge series, which may allow a remote attacker to obtain or alter the setting information of the product or execute some critical functions without authentication, e.g., rebooting the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-23578

Publication date:
10/05/2023
Improper access control vulnerability in SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier allows a remote unauthenticated attacker to connect to the product&amp;#39;s ADB port.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-23901

Publication date:
10/05/2023
Improper following of a certificate&amp;#39;s chain of trust exists in SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, which may allow a remote unauthenticated attacker to eavesdrop on or alter the communication sent to the WebUI of the product.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-22361

Publication date:
10/05/2023
Improper privilege management vulnerability in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier allows a remote authenticated attacker to alter a WebUI password of the product.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2022-4008

Publication date:
10/05/2023
In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025