Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-45813

Publication date:
18/10/2023
Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2023

CVE-2023-4601

Publication date:
18/10/2023
A stack-based buffer overflow vulnerability exists in NI System Configuration that could result in information disclosure and/or arbitrary code execution. Successful exploitation requires that an attacker can provide a specially crafted response. This affects NI System Configuration 2023 Q3 and all previous versions.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2023

CVE-2023-35656

Publication date:
18/10/2023
In multiple functions of protocolembmsadapter.cpp, there is a possible out<br /> of bounds read due to a missing bounds check. This could lead to remote<br /> information disclosure with no additional execution privileges needed. User<br /> interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2023-35663

Publication date:
18/10/2023
In Init of protocolnetadapter.cpp, there is a possible out of bounds read<br /> due to a missing bounds check. This could lead to remote information<br /> disclosure with no additional execution privileges needed. User interaction<br /> is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2023-26300

Publication date:
18/10/2023
A potential security vulnerability has been identified in the system BIOS for certain HP PC products which might allow escalation of privilege. HP is releasing firmware updates to mitigate the potential vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2023

CVE-2023-30911

Publication date:
18/10/2023
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2023-45911

Publication date:
18/10/2023
An issue in WIPOTEC GmbH ComScale v4.3.29.21344 and v4.4.12.723 allows unauthenticated attackers to login as any user without a password.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-45912

Publication date:
18/10/2023
WIPOTEC GmbH ComScale v4.3.29.21344 and v4.4.12.723 fails to validate user sessions, allowing unauthenticated attackers to read files from the underlying operating system and obtain directory listings.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-20261

Publication date:
18/10/2023
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.<br /> <br /> This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2024

CVE-2023-43250

Publication date:
18/10/2023
XNSoft Nconvert 7.136 is vulnerable to Buffer Overflow. There is a User Mode Write AV via a crafted image file. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2024

CVE-2023-45383

Publication date:
18/10/2023
In the module "SoNice etiquetage" (sonice_etiquetage) up to version 2.5.9 from Common-Services for PrestaShop, a guest can download personal information without restriction by performing a path traversal attack. Due to a lack of permissions control and a lack of control in the path name construction, a guest can perform a path traversal to view all files on the information system.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2024

CVE-2023-5642

Publication date:
18/10/2023
Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023