Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-28465

Publication date:
12/12/2023
The package-decompression feature in HL7 (Health Level 7) FHIR Core Libraries before 5.6.106 allows attackers to copy arbitrary files to certain directories via directory traversal, if an allowed directory name is a substring of the directory name chosen by the attacker. NOTE: this issue exists because of an incomplete fix for CVE-2023-24057.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2013-2513

Publication date:
12/12/2023
The flash_tool gem through 0.6.0 for Ruby allows command execution via shell metacharacters in the name of a downloaded file.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2009-4123

Publication date:
12/12/2023
The jruby-openssl gem before 0.6 for JRuby mishandles SSL certificate validation.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2020-12614

Publication date:
12/12/2023
An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. If the publisher criteria is selected, it defines the name of a publisher that must be present in the certificate (and also requires that the certificate is valid). If an Add Admin token is protected by this criteria, it can be leveraged by a malicious actor to achieve Elevation of Privileges from standard user to administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2020-28369

Publication date:
12/12/2023
In BeyondTrust Privilege Management for Windows (aka PMfW) through 5.7, a SYSTEM installation causes Cryptbase.dll to be loaded from the user-writable location %WINDIR%\Temp.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2023-46454

Publication date:
12/12/2023
In GL.iNET GL-AR300M routers with firmware v4.3.7, it is possible to inject arbitrary shell commands through a crafted package name in the package information functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2023-46455

Publication date:
12/12/2023
In GL.iNET GL-AR300M routers with firmware v4.3.7 it is possible to write arbitrary files through a path traversal attack in the OpenVPN client file upload functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2024

CVE-2023-46456

Publication date:
12/12/2023
In GL.iNET GL-AR300M routers with firmware 3.216 it is possible to inject arbitrary shell commands through the OpenVPN client file upload functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2023-50495

Publication date:
12/12/2023
NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-6593

Publication date:
12/12/2023
<br /> <br /> Client side permission bypass in Devolutions Remote Desktop Manager 2023.3.4.0 and earlier on iOS allows an attacker that has access to the application to execute entries in a SQL data source without restriction.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2023

CVE-2020-12612

Publication date:
12/12/2023
An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When specifying a program to elevate, it can typically be found within the Program Files (x86) folder and therefore uses the %ProgramFiles(x86)% environment variable. However, when this same policy gets pushed to a 32bit machine, this environment variable does not exist. Therefore, since the standard user can create a user level environment variable, they can repoint this variable to any folder the user has full control of. Then, the folder structure can be created in such a way that a rule matches and arbitrary code runs elevated.
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2023

CVE-2023-49990

Publication date:
12/12/2023
Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the function SetUpPhonemeTable at synthdata.c.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2024