Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-0524

Publication date:
01/02/2023
As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2023-0587

Publication date:
01/02/2023
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2022-31902

Publication date:
01/02/2023
Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Finder::add().
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2022-47768

Publication date:
01/02/2023
Serenissima Informatica Fast Checkin 1.0 is vulnerable to Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2022-47769

Publication date:
01/02/2023
An arbitrary file write vulnerability in Serenissima Informatica Fast Checkin v1.0 allows unauthenticated attackers to upload malicious files in the web root of the application to gain access to the server via the web shell.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2022-47770

Publication date:
01/02/2023
Serenissima Informatica Fast Checkin version v1.0 is vulnerable to Unauthenticated SQL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2023-23928

Publication date:
01/02/2023
reason-jose is a JOSE implementation in ReasonML and OCaml.`Jose.Jws.validate` does not check HS256 signatures. This allows tampering of JWS header and payload data if the service does not perform additional checks. Such tampering could expose applications using reason-jose to authorization bypass. Applications relying on JWS claims assertion to enforce security boundaries may be vulnerable to privilege escalation. This issue has been patched in version 0.8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
08/02/2023

CVE-2023-0606

Publication date:
01/02/2023
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2023

CVE-2023-23630

Publication date:
01/02/2023
Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don&amp;#39;t pass user supplied things directly to `res.render`. <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-23924

Publication date:
01/02/2023
Dompdf is an HTML to PDF converter. The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `` tags with uppercase letters. This may lead to arbitrary object unserialize on PHP
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24956

Publication date:
01/02/2023
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /cha.php.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2023-24241

Publication date:
01/02/2023
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/loginpost.php.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025