Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-23841

Publication date:
15/06/2023
<br /> SolarWinds Serv-U is submitting an HTTP request when changing or updating the attributes for File Share or File request.  Part of the URL of the request discloses sensitive data. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24031

Publication date:
15/06/2023
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 8.8.15. XSS can occur, via one of attributes of the webmail /h/ endpoint, to execute arbitrary JavaScript code, leading to information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2023-24030

Publication date:
15/06/2023
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0 and 8.8.15. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL if url sanitisation is bypassed in incoming requests. NOTE: this is similar, but not identical, to CVE-2021-34807.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2023-24032

Publication date:
15/06/2023
In Zimbra Collaboration Suite through 9.0 and 8.8.15, an attacker (who has initial user access to a Zimbra server instance) can execute commands as root by passing one of JVM arguments, leading to local privilege escalation (LPE).
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2023-34797

Publication date:
15/06/2023
Broken access control in the Registration page (/Registration.aspx) of Termenos CWX v8.5.6 allows attackers to access sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2023-34800

Publication date:
15/06/2023
D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at genacgi_main.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2024

CVE-2023-2747

Publication date:
15/06/2023
The initialization vector (IV) used by the secure engine (SE) for encrypting data stored in the SE flash memory is uninitialized.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024

CVE-2023-2683

Publication date:
15/06/2023
A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-34242

Publication date:
15/06/2023
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of `ReferenceGrant` resources to admin users by using Kubernetes RBAC.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2023

CVE-2023-33243

Publication date:
15/06/2023
RedTeam Pentesting discovered that the web interface of STARFACE as well as its REST API allows authentication using the SHA512 hash of the password instead of the cleartext password. While storing password hashes instead of cleartext passwords in an application&amp;#39;s database generally has become best practice to protect users&amp;#39; passwords in case of a database compromise, this is rendered ineffective when allowing to authenticate using the password hash.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34852

Publication date:
15/06/2023
PublicCMS
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2024

CVE-2023-31672

Publication date:
15/06/2023
In the PrestaShop
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025