Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-49123

Publication date:
09/01/2024
A vulnerability has been identified in Solid Edge SE2023 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2024

CVE-2023-49124

Publication date:
09/01/2024
A vulnerability has been identified in Solid Edge SE2023 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2024

CVE-2023-49126

Publication date:
09/01/2024
A vulnerability has been identified in Solid Edge SE2023 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2024

CVE-2023-49121

Publication date:
09/01/2024
A vulnerability has been identified in Solid Edge SE2023 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2024

CVE-2023-42797

Publication date:
09/01/2024
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
16/01/2024

CVE-2023-44120

Publication date:
09/01/2024
A vulnerability has been identified in Spectrum Power 7 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
16/01/2024

CVE-2023-49235

Publication date:
09/01/2024
An issue was discovered in libremote_dbg.so on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Filtering of debug information is mishandled during use of popen. Consequently, an attacker can bypass validation and execute a shell command.
Severity CVSS v4.0: Pending analysis
Last modification:
12/01/2024

CVE-2023-49236

Publication date:
09/01/2024
A stack-based buffer overflow was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices, leading to arbitrary command execution. This occurs because of lack of length validation during an sscanf of a user-entered scale field in the RTSP playback function of davinci.
Severity CVSS v4.0: Pending analysis
Last modification:
12/01/2024

CVE-2023-49237

Publication date:
09/01/2024
An issue was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Command injection can occur because the system function is used by davinci to unpack language packs without strict filtering of URL strings.
Severity CVSS v4.0: Pending analysis
Last modification:
16/01/2024

CVE-2023-50974

Publication date:
09/01/2024
In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwrite user are stored in a ~/.appwrite/prefs.json file with 0644 as UNIX permissions. Any user of the local system can access those credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
12/01/2024

CVE-2023-6149

Publication date:
09/01/2024
<br /> Qualys Jenkins Plugin for WAS prior to version and including 2.0.11 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data
Severity CVSS v4.0: Pending analysis
Last modification:
12/01/2024

CVE-2023-6148

Publication date:
09/01/2024
Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025