Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-3078

Publication date:
17/08/2023
An uncontrolled search path vulnerability was reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2023

CVE-2023-4028

Publication date:
17/08/2023
A buffer overflow has been identified in the SystemUserMasterHddPwdDxe driver in some Lenovo Notebook products which may allow an attacker with local access and elevated privileges to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2023

CVE-2023-34419

Publication date:
17/08/2023
A buffer overflow has been identified in the SetupUtility driver in some Lenovo Notebook products which may allow an attacker with local access and elevated privileges to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2023

CVE-2023-2914

Publication date:
17/08/2023
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2023

CVE-2023-2915

Publication date:
17/08/2023
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message resulting in a denial-of-service condition.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2023

CVE-2023-2917

Publication date:
17/08/2023
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.  Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed.  A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2023

CVE-2023-31072

Publication date:
17/08/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Praveen Goswami Advanced Category Template plugin
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2024

CVE-2023-28693

Publication date:
17/08/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Balasaheb Bhise Advanced Youtube Channel Pagination plugin
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2023

CVE-2023-28783

Publication date:
17/08/2023
Auth. (shop manager+) Stored Cross-Site Scripting (XSS) vulnerability in PHPRADAR Woocommerce Tip/Donation plugin
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2023

CVE-2023-31079

Publication date:
17/08/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Chris Roberts Tippy plugin
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2023

CVE-2023-40272

Publication date:
17/08/2023
Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.<br /> It is recommended to upgrade to a version that is not affected.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-34412

Publication date:
17/08/2023
A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an<br /> authenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
29/02/2024