Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-50475

Publication date:
21/12/2023
An issue was discovered in bcoin-org bcoin version 2.2.0, allows remote attackers to obtain sensitive information via weak hashing algorithms in the component \vendor\faye-websocket.js.
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2023-50477

Publication date:
21/12/2023
An issue was discovered in nos client version 0.6.6, allows remote attackers to escalate privileges via getRPCEndpoint.js.
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2023-50481

Publication date:
21/12/2023
An issue was discovered in blinksocks version 3.3.8, allows remote attackers to obtain sensitive information via weak encryption algorithms in the component /presets/ssr-auth-chain.js.
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2023-5988

Publication date:
21/12/2023
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Uyumsoft Information System and Technologies LioXERP allows Reflected XSS.This issue affects LioXERP: before v.146.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2024

CVE-2023-5989

Publication date:
21/12/2023
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Uyumsoft Information System and Technologies&amp;#39; LioXERP allows an authenticated user to execute Stored XSS.<br /> <br /> This issue affects LioXERP: before v.146.
Severity CVSS v4.0: Pending analysis
Last modification:
25/11/2024

CVE-2023-48291

Publication date:
21/12/2023
Apache Airflow, in versions prior to 2.8.0, contains a security vulnerability that allows an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources for DAGs that the user had no access to, thus, enabling the user to clear DAGs they shouldn&amp;#39;t.<br /> <br /> This is a missing fix for CVE-2023-42792 in Apache Airflow 2.7.2 <br /> <br /> Users of Apache Airflow are strongly advised to upgrade to version 2.8.0 or newer to mitigate the risk associated with this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2023-49920

Publication date:
21/12/2023
Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user&amp;#39;s consent.<br /> Users are advised to upgrade to version 2.8.0 or later which is not affected
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2023-50783

Publication date:
21/12/2023
Apache Airflow, versions before 2.8.0, is affected by a vulnerability that allows an authenticated user without the variable edit permission, to update a variable.<br /> This flaw compromises the integrity of variable management, potentially leading to unauthorized data modification.<br /> Users are recommended to upgrade to 2.8.0, which fixes this issue
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2023-51655

Publication date:
21/12/2023
In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2023

CVE-2023-47265

Publication date:
21/12/2023
Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a DAG author to add an unbounded and not-sanitized javascript in the parameter description field of the DAG. This Javascript can be executed on the client side of any of the user who looks at the tasks in the browser sandbox. While this issue does not allow to exit the browser sandbox or manipulation of the server-side data - more than the DAG author already has, it allows to modify what the user looking at the DAG details sees in the browser - which opens up all kinds of possibilities of misleading other users.<br /> <br /> Users of Apache Airflow are recommended to upgrade to version 2.8.0 or newer to mitigate the risk associated with this vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-2585

Publication date:
21/12/2023
Keycloak&amp;#39;s device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2024

CVE-2023-7026

Publication date:
21/12/2023
A vulnerability was found in Lightxun IPTV Gateway up to 20231208. It has been rated as problematic. This issue affects some unknown processing of the file /ZHGXTV/index.php/admin/index/web_upload_template.html. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248579.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024