Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-2712

Publication date:
27/01/2023
In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-36659

Publication date:
27/01/2023
In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2020-36658

Publication date:
27/01/2023
In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2023-24060

Publication date:
27/01/2023
Haven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functionality. Authenticated users with the ability to create new RSS Feeds or add RSS Feeds can supply an arbitrary hostname (or even the hostname of the Haven server itself). NOTE: this product has significant usage but does not have numbered releases; ordinary end users may typically use the master branch.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2023-22740

Publication date:
27/01/2023
Discourse is an open source platform for community discussion. Versions prior to 3.1.0.beta1 (beta) (tests-passed) are vulnerable to Allocation of Resources Without Limits. Users can create chat drafts of an unlimited length, which can cause a denial of service by generating an excessive load on the server. Additionally, an unlimited number of drafts were loaded when loading the user. This issue has been patched in version 2.1.0.beta1 (beta) and (tests-passed). Users should upgrade to the latest version where a limit has been introduced. There are no workarounds available.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0519

Publication date:
26/01/2023
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2023

CVE-2023-0493

Publication date:
26/01/2023
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2023

CVE-2022-46967

Publication date:
26/01/2023
An access control issue in Revenue Collection System v1.0 allows unauthenticated attackers to view the contents of /admin/DBbackup/ directory.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2025

CVE-2022-46966

Publication date:
26/01/2023
Revenue Collection System v1.0 was discovered to contain a SQL injection vulnerability at step1.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2023-0509

Publication date:
26/01/2023
Improper Certificate Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev44.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2023

CVE-2023-0488

Publication date:
26/01/2023
Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2023

CVE-2023-0470

Publication date:
26/01/2023
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2023