Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-43576

Publication date:
08/11/2023
A buffer overflow was reported in the WMISwSmi module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-43577

Publication date:
08/11/2023
A buffer overflow was reported in the ReFlash module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-39435

Publication date:
08/11/2023
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,<br /> CB6231, B8520, B8220, and CD321 IP Cameras <br /> <br /> with firmware version M2.1.6.05 are <br /> vulnerable to stack-based overflows. During the process of updating <br /> certain settings sent from incoming network requests, the product does <br /> not sufficiently check or validate allocated buffer size. This may lead <br /> to remote code execution.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-3959

Publication date:
08/11/2023
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,<br /> CB6231, B8520, B8220, and CD321 <br /> <br /> IP Cameras<br /> <br /> with firmware version M2.1.6.05 are <br /> vulnerable to multiple instances of stack-based overflows. While <br /> processing XML elements from incoming network requests, the product does<br /> not sufficiently check or validate allocated buffer size. This may lead<br /> to remote code execution.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-43571

Publication date:
08/11/2023
A buffer overflow was reported in the BiosExtensionLoader module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2023-43572

Publication date:
08/11/2023
A buffer over-read was reported in the BiosExtensionLoader module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to disclose sensitive information.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2023-5079

Publication date:
08/11/2023
Lenovo LeCloud App improper input validation allows attackers to access arbitrary components and arbitrary file downloads, which could result in information disclosure.<br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023

CVE-2023-47114

Publication date:
08/11/2023
Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in your runtime environment, and the enforcement of privacy regulations in your code. The Fides web application allows data subject users to request access to their personal data. If the request is approved by the data controller user operating the Fides web application, the data subject&amp;#39;s personal data can then retrieved from connected systems and data stores before being bundled together as a data subject access request package for the data subject to download. Supported data formats for the package include json and csv, but the most commonly used format is a series of HTML files compressed in a ZIP file. Once downloaded and unzipped, the data subject user can browse the HTML files on their local machine. It was identified that there was no validation of input coming from e.g. the connected systems and data stores which is later reflected in the downloaded data. This can result in an HTML injection that can be abused e.g. for phishing attacks or malicious JavaScript code execution, but only in the context of the data subject&amp;#39;s browser accessing a HTML page using the `file://` protocol. Exploitation is limited to rogue Admin UI users, malicious connected system / data store users, and the data subject user if tricked via social engineering into submitting malicious data themselves. This vulnerability has been patched in version 2.23.3.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-4632

Publication date:
08/11/2023
An uncontrolled search path vulnerability was reported in Lenovo System Update that could allow an attacker with local access to execute code with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-4706

Publication date:
08/11/2023
<br /> A privilege escalation vulnerability was reported in Lenovo preloaded devices deployed using Microsoft AutoPilot under a standard user account due to incorrect default privileges.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023

CVE-2023-4891

Publication date:
08/11/2023
<br /> A potential use-after-free vulnerability was reported in the Lenovo View driver that could result in denial of service. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-5075

Publication date:
08/11/2023
A buffer overflow was reported in the FmpSipoCapsuleDriver driver in the IdeaPad Duet 3-10IGL5 that may allow a local attacker with elevated privileges to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023