Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-39853

Publication date:
06/01/2024
SQL Injection vulnerability in Dzzoffice version 2.01, allows remote attackers to obtain sensitive information via the doobj and doevent parameters in the Network Disk backend module.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2023-50612

Publication date:
06/01/2024
Insecure Permissions vulnerability in fit2cloud Cloud Explorer Lite version 1.4.1, allow local attackers to escalate privileges and obtain sensitive information via the cloud accounts parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2024-21642

Publication date:
05/01/2024
D-Tale is a visualizer for Pandas data structures. Users hosting versions D-Tale prior to 3.9.0 publicly can be vulnerable to server-side request forgery (SSRF), allowing attackers to access files on the server. Users should upgrade to version 3.9.0, where the `Load From the Web` input is turned off by default. The only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.
Severity CVSS v4.0: Pending analysis
Last modification:
18/01/2024

CVE-2024-21641

Publication date:
05/01/2024
Flarum is open source discussion platform software. Prior to version 1.8.5, the Flarum `/logout` route includes a redirect parameter that allows any third party to redirect users from a (trusted) domain of the Flarum installation to redirect to any link. For logged-in users, the logout must be confirmed. Guests are immediately redirected. This could be used by spammers to redirect to a web address using a trusted domain of a running Flarum installation. The vulnerability has been fixed and published as flarum/core v1.8.5. As a workaround, some extensions modifying the logout route can remedy this issue if their implementation is safe.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025

CVE-2024-0247

Publication date:
05/01/2024
A vulnerability classified as critical was found in CodeAstro Online Food Ordering System 1.0. This vulnerability affects unknown code of the file /admin/ of the component Admin Panel. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249778 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-47219

Publication date:
05/01/2024
A SQL injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.<br /> <br /> We have already fixed the vulnerability in the following version:<br /> QuMagie 2.2.1 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2024

CVE-2023-47559

Publication date:
05/01/2024
A cross-site scripting (XSS) vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.<br /> <br /> We have already fixed the vulnerability in the following version:<br /> QuMagie 2.2.1 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2024

CVE-2023-47560

Publication date:
05/01/2024
An OS command injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following version:<br /> QuMagie 2.2.1 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2024

CVE-2023-46836

Publication date:
05/01/2024
The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative<br /> Return Stack Overflow) are not IRQ-safe. It was believed that the<br /> mitigations always operated in contexts with IRQs disabled.<br /> <br /> However, the original XSA-254 fix for Meltdown (XPTI) deliberately left<br /> interrupts enabled on two entry paths; one unconditionally, and one<br /> conditionally on whether XPTI was active.<br /> <br /> As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations<br /> are not active together by default. Therefore, there is a race<br /> condition whereby a malicious PV guest can bypass BTC/SRSO protections<br /> and launch a BTC/SRSO attack against Xen.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-46837

Publication date:
05/01/2024
Arm provides multiple helpers to clean &amp; invalidate the cache<br /> for a given region. This is, for instance, used when allocating<br /> guest memory to ensure any writes (such as the ones during scrubbing)<br /> have reached memory before handing over the page to a guest.<br /> <br /> Unfortunately, the arithmetics in the helpers can overflow and would<br /> then result to skip the cache cleaning/invalidation. Therefore there<br /> is no guarantee when all the writes will reach the memory.<br /> <br /> This undefined behavior was meant to be addressed by XSA-437, but the<br /> approach was not sufficient.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2023-46835

Publication date:
05/01/2024
The current setup of the quarantine page tables assumes that the<br /> quarantine domain (dom_io) has been initialized with an address width<br /> of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels.<br /> <br /> However dom_io being a PV domain gets the AMD-Vi IOMMU page tables<br /> levels based on the maximum (hot pluggable) RAM address, and hence on<br /> systems with no RAM above the 512GB mark only 3 page-table levels are<br /> configured in the IOMMU.<br /> <br /> On systems without RAM above the 512GB boundary<br /> amd_iommu_quarantine_init() will setup page tables for the scratch<br /> page with 4 levels, while the IOMMU will be configured to use 3 levels<br /> only, resulting in the last page table directory (PDE) effectively<br /> becoming a page table entry (PTE), and hence a device in quarantine<br /> mode gaining write access to the page destined to be a PDE.<br /> <br /> Due to this page table level mismatch, the sink page the device gets<br /> read/write access to is no longer cleared between device assignment,<br /> possibly leading to data leaks.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2023-45040

Publication date:
05/01/2024
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.<br /> <br /> We have already fixed the vulnerability in the following versions:<br /> QTS 5.1.4.2596 build 20231128 and later<br /> QuTS hero h5.1.4.2596 build 20231128 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2024