Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-22522

Publication date:
06/12/2023
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details<br /> <br /> Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2026

CVE-2023-40053

Publication date:
06/12/2023
A vulnerability has been identified within Serv-U 15.4 that allows an authenticated actor to insert content on the file share function feature of Serv-U, which could be used maliciously.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2023-41268

Publication date:
06/12/2023
Improper input validation vulnerability in Samsung Open Source Escargot allows stack overflow and segmentation fault. This issue affects Escargot: from 3.0.0 through 4.0.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2023-6508

Publication date:
06/12/2023
Use after free in Media Stream in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2023-6509

Publication date:
06/12/2023
Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2023-6510

Publication date:
06/12/2023
Use after free in Media Capture in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2023-6511

Publication date:
06/12/2023
Inappropriate implementation in Autofill in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2024

CVE-2023-6512

Publication date:
06/12/2023
Inappropriate implementation in Web Browser UI in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially spoof the contents of an iframe dialog context menu via a crafted HTML page. (Chromium security severity: Low)
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2021-27795

Publication date:
06/12/2023
Brocade Fabric OS (FOS) hardware <br /> platforms running any version of Brocade Fabric OS software, which <br /> supports the license string format; contain cryptographic <br /> issues that could allow for the installation of forged or fraudulent <br /> license keys. This would allow attackers or a malicious party to forge a<br /> counterfeit license key that the Brocade Fabric OS platform would <br /> authenticate and activate as if it were a legitimate license key. <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-48940

Publication date:
06/12/2023
A stored cross-site scripting (XSS) vulnerability in /admin.php of DaiCuo v2.5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-28875

Publication date:
06/12/2023
A Stored XSS issue in shared files download terms in Filerun Update 20220202 allows attackers to inject JavaScript code that is executed when a user follows the crafted share link.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-28876

Publication date:
06/12/2023
A Broken Access Control issue in comments to uploaded files in Filerun through Update 20220202 allows attackers to delete comments on files uploaded by other users.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023