Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-35855

Publication date:
19/06/2023
A buffer overflow in Counter-Strike through 8684 allows a game server to execute arbitrary code on a remote client's machine by modifying the lservercfgfile console variable.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2023-35857

Publication date:
19/06/2023
In Siren Investigate before 13.2.2, session keys remain active even after logging out.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2023-35853

Publication date:
19/06/2023
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2023-35852

Publication date:
19/06/2023
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-34657

Publication date:
19/06/2023
A stored cross-site scripting (XSS) vulnerability in Eyoucms v1.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the web_recordnum parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-35847

Publication date:
19/06/2023
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not have an MSS lower bound (e.g., it could be zero).
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2023-35846

Publication date:
19/06/2023
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not check the transport layer length in a frame before performing port filtering.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-35848

Publication date:
19/06/2023
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 lacks certain size calculations before attempting to set a value of an mss structure member.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2023-35849

Publication date:
19/06/2023
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2023-35844

Publication date:
19/06/2023
packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-35840

Publication date:
19/06/2023
_joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-35839

Publication date:
19/06/2023
A bypass in the component sofa-hessian of Solon before v2.3.3 allows attackers to execute arbitrary code via providing crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2024