Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-36543

Publication date:
12/07/2023
Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user can use crafted input to make the current request hang. It is recommended to upgrade to a version that is not affected
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2022-46651

Publication date:
12/07/2023
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an unauthorized actor to gain access to sensitive information in Connection edit view. This vulnerability is considered low since it requires someone with access to Connection resources specifically updating the connection to exploit it. Users should upgrade to version 2.6.3 or later which has removed the vulnerability.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2023-22887

Publication date:
12/07/2023
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2023-22888

Publication date:
12/07/2023
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2023-30428

Publication date:
12/07/2023
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Broker&amp;#39;s Rest Producer allows authenticated user with a custom HTTP header to produce a message to any topic using the broker&amp;#39;s admin role.<br /> This issue affects Apache Pulsar Brokers: from 2.9.0 through 2.9.5, from 2.10.0 before 2.10.4, 2.11.0.<br /> <br /> The vulnerability is exploitable when an attacker can connect directly to the Pulsar Broker. If an attacker is connecting through the Pulsar Proxy, there is no known way to exploit this authorization vulnerability.<br /> <br /> There are two known risks for affected users. First, an attacker could produce garbage messages to any topic in the cluster. Second, an attacker could produce messages to the topic level policies topic for other tenants and influence topic settings that could lead to exfiltration and/or deletion of messages for other tenants.<br /> <br /> 2.8 Pulsar Broker users and earlier are unaffected.<br /> 2.9 Pulsar Broker users should upgrade to one of the patched versions.<br /> 2.10 Pulsar Broker users should upgrade to at least 2.10.4.<br /> 2.11 Pulsar Broker users should upgrade to at least 2.11.1.<br /> 3.0 Pulsar Broker users are unaffected.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2023-30429

Publication date:
12/07/2023
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar.<br /> <br /> This issue affects Apache Pulsar: before 2.10.4, and 2.11.0.<br /> <br /> When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mTLS authentication to authenticate with the Pulsar Function Worker, the Pulsar Function Worker incorrectly performs authorization by using the Proxy&amp;#39;s role for authorization instead of the client&amp;#39;s role, which can lead to privilege escalation, especially if the proxy is configured with a superuser role.<br /> <br /> The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version.<br /> <br /> 2.10 Pulsar Function Worker users should upgrade to at least 2.10.4.<br /> 2.11 Pulsar Function Worker users should upgrade to at least 2.11.1.<br /> 3.0 Pulsar Function Worker users are unaffected.<br /> Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2022-45855

Publication date:
12/07/2023
SpringEL injection in the metrics source in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2022-42009

Publication date:
12/07/2023
SpringEL injection in the server agent in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2023-3106

Publication date:
12/07/2023
A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2023-33905

Publication date:
12/07/2023
In iwnpi server, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2024

CVE-2023-33904

Publication date:
12/07/2023
In hci_server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2023

CVE-2023-33895

Publication date:
12/07/2023
In fastDial service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
Severity CVSS v4.0: Pending analysis
Last modification:
18/07/2023