Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-47561

Publication date:
20/09/2023
The web application stores credentials in clear text in the "admin.xml" file, which can be accessed without logging into the website, which could allow an attacker to obtain credentials related to all users, including admin users, in clear text, and use them to subsequently execute malicious actions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-47562

Publication date:
20/09/2023
Vulnerability in the RCPbind service running on UDP port (111), allowing a remote attacker to create a denial of service (DoS) condition.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-47560

Publication date:
20/09/2023
The lack of web request control on ekorCCP and ekorRCI devices allows a potential attacker to create custom requests to execute malicious actions when a user is logged in.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2023-2163

Publication date:
20/09/2023
Incorrect verifier pruning in BPF in Linux Kernel &gt;=5.4 leads to unsafe<br /> code paths being incorrectly marked as safe, resulting in arbitrary read/write in<br /> kernel memory, lateral privilege escalation, and container escape.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2024

CVE-2023-43617

Publication date:
20/09/2023
An issue was discovered in Croc through 9.6.5. When a custom shared secret is used, the sender and receiver may divulge parts of this secret to an untrusted Relay, as part of composing a room name.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-43618

Publication date:
20/09/2023
An issue was discovered in Croc through 9.6.5. The protocol requires a sender to provide its local IP addresses in cleartext via an ips? message.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-43619

Publication date:
20/09/2023
An issue was discovered in Croc through 9.6.5. A sender may send dangerous new files to a receiver, such as executable content or a .ssh/authorized_keys file.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-43620

Publication date:
20/09/2023
An issue was discovered in Croc through 9.6.5. A sender may place ANSI or CSI escape sequences in a filename to attack the terminal device of a receiver.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-43621

Publication date:
20/09/2023
An issue was discovered in Croc through 9.6.5. The shared secret, located on a command line, can be read by local users who list all processes and their arguments.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-43616

Publication date:
20/09/2023
An issue was discovered in Croc through 9.6.5. A sender can cause a receiver to overwrite files during ZIP extraction.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2024

CVE-2023-26144

Publication date:
20/09/2023
Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance.<br /> <br /> **Note:** It was not proven that this vulnerability can crash the process.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-5062

Publication date:
20/09/2023
The WordPress Charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via &amp;#39;wp_charts&amp;#39; shortcode in versions up to, and including, 0.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023