Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-39008

Publication date:
23/11/2023
<br /> IBM QRadar WinCollect Agent 10.0 through 10.1.7 could allow a privileged user to obtain sensitive information due to missing best practices. IBM X-Force ID: 213551.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-49213

Publication date:
23/11/2023
The API endpoints in Ironman PowerShell Universal 3.0.0 through 4.2.0 allow remote attackers to execute arbitrary commands via crafted HTTP requests if a param block is used, due to invalid sanitization of input strings. The fixed versions are 3.10.2, 4.1.10, and 4.2.1.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-49214

Publication date:
23/11/2023
Usedesk before 1.7.57 allows chat template injection.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-49215

Publication date:
23/11/2023
Usedesk before 1.7.57 allows filter reflected XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-49216

Publication date:
23/11/2023
Usedesk before 1.7.57 allows profile stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-47244

Publication date:
23/11/2023
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Omnisend Email Marketing for WooCommerce by Omnisend.This issue affects Email Marketing for WooCommerce by Omnisend: from n/a through 1.13.8.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-47529

Publication date:
23/11/2023
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ThemeIsle Cloud Templates &amp; Patterns collection.This issue affects Cloud Templates &amp; Patterns collection: from n/a through 1.2.2.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-49210

Publication date:
23/11/2023
The openssl (aka node-openssl) NPM package through 2.0.0 was characterized as "a nonsense wrapper with no real purpose" by its author, and accepts an opts argument that contains a verb field (used for command execution). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-5972

Publication date:
23/11/2023
A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to crash the system or escalate their privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-49208

Publication date:
23/11/2023
scheme/webauthn.c in Glewlwyd SSO server before 2.7.6 has a possible buffer overflow during FIDO2 credentials validation in webauthn registration.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025

CVE-2022-44010

Publication date:
23/11/2023
An issue was discovered in ClickHouse before 22.9.1.2603. An attacker could send a crafted HTTP request to the HTTP Endpoint (usually listening on port 8123 by default), causing a heap-based buffer overflow that crashes the process. This does not require authentication. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2022-44011

Publication date:
23/11/2023
An issue was discovered in ClickHouse before 22.9.1.2603. An authenticated user (with the ability to load data) could cause a heap buffer overflow and crash the server by inserting a malformed CapnProto object. The fixed versions are 22.9.1.2603, 22.8.2.11, 22.7.4.16, 22.6.6.16, and 22.3.12.19.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023