Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-49117

Publication date:
26/12/2023
PowerCMS (6 Series, 5 Series, and 4 Series) contains a stored cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user's web browser. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2024

CVE-2023-50297

Publication date:
26/12/2023
Open redirect vulnerability in PowerCMS (6 Series, 5 Series, and 4 Series) allows a remote unauthenticated attacker to redirect users to arbitrary web sites via a specially crafted URL. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2024

CVE-2023-51654

Publication date:
26/12/2023
Improper link resolution before file access ('Link Following') issue exists in iPrint&Scan Desktop for Windows versions 11.0.0 and earlier. A symlink attack by a malicious user may cause a Denial-of-service (DoS) condition on the PC.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2024

CVE-2023-27150

Publication date:
26/12/2023
openCRX 5.2.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name field after creation of a Tracker in Manage Activity.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2024

CVE-2023-28616

Publication date:
26/12/2023
An issue was discovered in Stormshield Network Security (SNS) before 4.3.17, 4.4.x through 4.6.x before 4.6.4, and 4.7.x before 4.7.1. It affects user accounts for which the password has an equals sign or space character. The serverd process logs such passwords in cleartext, and potentially sends these logs to the Syslog component.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2024

CVE-2023-7111

Publication date:
26/12/2023
A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. Affected is an unknown function of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249006 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2023-38321

Publication date:
25/12/2023
OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2024

CVE-2022-34267

Publication date:
25/12/2023
An issue was discovered in RWS WorldServer before 11.7.3. Adding a token parameter with the value of 02 bypasses all authentication requirements. Arbitrary Java code can be uploaded and executed via a .jar archive to the ws-api/v2/customizations/api endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
04/01/2024

CVE-2022-34268

Publication date:
25/12/2023
An issue was discovered in RWS WorldServer before 11.7.3. /clientLogin deserializes Java objects without authentication, leading to command execution on the host.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2023-31224

Publication date:
25/12/2023
There is broken access control during authentication in Jamf Pro Server before 10.46.1.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2024

CVE-2023-36485

Publication date:
25/12/2023
The workflow-engine of ILIAS before 7.23 and 8 before 8.3 allows remote authenticated users to run arbitrary system commands on the application server as the application user via a malicious BPMN2 workflow definition file.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2023-36486

Publication date:
25/12/2023
The workflow-engine of ILIAS before 7.23 and 8 before 8.3 allows remote authenticated users to run arbitrary system commands on the application server as the application user by uploading a workflow definition file with a malicious filename.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024