Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-36198

Publication date:
25/08/2023
Buffer Overflow vulnerability in skalenetwork sgxwallet v.1.9.0 allows an attacker to cause a denial of service via the trustedBlsSignMessage function.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023

CVE-2023-40568

Publication date:
25/08/2023
Rejected reason: GitHub has been informed that the requestor is working with another CNA for these vulnerabilities.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24621

Publication date:
25/08/2023
An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2023

CVE-2023-24620

Publication date:
25/08/2023
An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2023

CVE-2021-27932

Publication date:
25/08/2023
Stormshield Network Security (SNS) VPN SSL Client 2.1.0 through 2.8.0 has Insecure Permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2023

CVE-2023-25848

Publication date:
25/08/2023
ArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. <br /> <br /> The information disclosed is limited to a single attribute in a database connection string. No business data is disclosed.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2019-13690

Publication date:
25/08/2023
Inappropriate implementation in OS in Google Chrome on ChromeOS prior to 75.0.3770.80 allowed a remote attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2019-13689

Publication date:
25/08/2023
Inappropriate implementation in OS in Google Chrome on ChromeOS prior to 75.0.3770.80 allowed a remote attacker to perform arbitrary read/write via a malicious file. (Chromium security severity: Critical)
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-38201

Publication date:
25/08/2023
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2023-40796

Publication date:
25/08/2023
Phicomm k2 v22.6.529.216 was discovered to contain a command injection vulnerability via the function luci.sys.call.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2024

CVE-2023-40798

Publication date:
25/08/2023
In Tenda AC23 v16.03.07.45_cn, the formSetIPv6status and formGetWanParameter functions do not authenticate user input parameters, resulting in a post-authentication stack overflow vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023

CVE-2023-40797

Publication date:
25/08/2023
In Tenda AC23 v16.03.07.45_cn, the sub_4781A4 function does not validate the parameters entered by the user, resulting in a post-authentication stack overflow vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023