Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-3029

Publication date:
01/06/2023
A vulnerability has been found in Guangdong Pythagorean OA Office System up to 4.50.31 and classified as problematic. This vulnerability affects unknown code of the file /note/index/delete. The manipulation of the argument id leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230458 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-3028

Publication date:
01/06/2023
Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> Multiple vulnerabilities were identified:<br /> <br /> <br /> <br /> - The MQTT backend does not require authentication, allowing unauthorized connections from an attacker.<br /> <br /> <br /> <br /> - The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend.<br /> <br /> <br /> <br /> - The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle&amp;#39;s location.<br /> <br /> <br /> <br /> - The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend.<br /> <br /> <br /> The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2022-4333

Publication date:
01/06/2023
Hardcoded Credentials in multiple SPRECON-E CPU variants of Sprecher Automation allows an remote attacker to take over the device. These accounts should be deactivated according to Sprecher&amp;#39;s hardening guidelines.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2023

CVE-2022-4332

Publication date:
01/06/2023
In Sprecher Automation SPRECON-E-C/P/T3 CPU in variant PU244x a vulnerable firmware verification has been identified. Through physical access and hardware manipulation, an attacker might be able to bypass hardware-based code verification and thus inject and execute arbitrary code and gain full access of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2023

CVE-2023-24584

Publication date:
01/06/2023
<br /> Controller 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature. <br /> <br /> <br /> <br /> <br /> This issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a, all versions of vCR8.40 and prior.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2023

CVE-2010-10010

Publication date:
01/06/2023
A vulnerability classified as problematic has been found in Stars Alliance PsychoStats up to 3.2.2a. This affects an unknown part of the file upload/admin/login.php. The manipulation of the argument ref leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.2.2b is able to address this issue. The identifier of the patch is 5d3b7311fd5085ec6ea1b1bfa9a05285964e07e4. It is recommended to upgrade the affected component. The identifier VDB-230265 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-33778

Publication date:
01/06/2023
Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-33716

Publication date:
01/06/2023
mp4v2 v2.1.3 was discovered to contain a memory leak via the class MP4StringProperty at mp4property.cpp.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-33719

Publication date:
01/06/2023
mp4v2 v2.1.3 was discovered to contain a memory leak via MP4SdpAtom::Read() at atom_sdp.cpp
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-34312

Publication date:
01/06/2023
In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and QQProtectEngine.dll do not validate pointers from inter-process communication, which leads to a write-what-where condition.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-29748

Publication date:
01/06/2023
Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-33461

Publication date:
01/06/2023
iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring&amp;#39;s return.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025