Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4593

Publication date:
23/11/2023
Path traversal vulnerability whose exploitation could allow an authenticated remote user to bypass SecurityManager's intended restrictions and list a parent directory via any filename, such as a multiple ..%2F value affecting the 'dodoc' parameter in the /MailAdmin_dll.htm file.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2023

CVE-2023-3631

Publication date:
23/11/2023
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Medart Health Services Medart Notification Panel allows SQL Injection.This issue affects Medart Notification Panel: through 20231123. <br /> <br /> NOTE: The vendor was contacted early about this disclosure but did not respond in any way.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-43123

Publication date:
23/11/2023
On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems.<br /> <br /> The method File.createTempFile on unix-like systems creates a file with predefined name (so easily identifiable) and by default will create this file with the permissions -rw-r--r--. Thus, if sensitive information is written to this file, other local users can read this information.<br /> <br /> File.createTempFile(String, String) will create a temporary file in the system temporary directory if the &amp;#39;java.io.tmpdir&amp;#39; system property is not explicitly set. <br /> <br /> This affects the class  https://github.com/apache/storm/blob/master/storm-core/src/jvm/org/apache/storm/utils/TopologySpoutLag.java#L99  and was introduced by  https://issues.apache.org/jira/browse/STORM-3123 <br /> <br /> In practice, this has a very limited impact as this class is used only if ui.disable.spout.lag.monitoring<br /> <br /> is set to false, but its value is true by default.<br /> Moreover, the temporary file gets deleted soon after its creation.<br /> <br /> The solution is to use  Files.createTempFile https://docs.oracle.com/en/java/javase/11/docs/api/java.base/java/nio/file/Files.html#createTempFile(java.lang.String,java.lang.String,java.nio.file.attribute.FileAttribute...)  instead.<br /> <br /> We recommend that all users upgrade to the latest version of Apache Storm.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-4406

Publication date:
23/11/2023
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in KC Group E-Commerce Software allows Reflected XSS.This issue affects E-Commerce Software: through 20231123. <br /> <br /> NOTE: The vendor was contacted early about this disclosure but did not respond in any way.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2023

CVE-2023-28813

Publication date:
23/11/2023
An attacker could exploit a vulnerability by sending crafted messages to computers installed with this plug-in to modify plug-in parameters, which could cause affected computers to download malicious files.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-3377

Publication date:
23/11/2023
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Veribilim Software Computer Veribase allows SQL Injection.This issue affects Veribase: through 20231123. <br /> <br /> NOTE: The vendor was contacted early about this disclosure but did not respond in any way.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-28812

Publication date:
23/11/2023
There is a buffer overflow vulnerability in a web browser plug-in could allow an attacker to exploit the vulnerability by sending crafted messages to computers installed with this plug-in, which could lead to arbitrary code execution or cause process exception of the plug-in.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-44290

Publication date:
23/11/2023
<br /> Dell Command | Monitor versions prior to 10.10.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-43086

Publication date:
23/11/2023
<br /> Dell Command | Configure, versions prior to 4.11.0, contains an improper access control vulnerability. A local malicious user could potentially modify files inside installation folder during application upgrade, leading to privilege escalation.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-44289

Publication date:
23/11/2023
<br /> Dell Command | Configure versions prior to 4.11.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-39253

Publication date:
23/11/2023
<br /> Dell OS Recovery Tool, versions 2.2.4013, 2.3.7012.0, and 2.3.7515.0 contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability, leading to the elevation of privilege on the system.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2023

CVE-2023-28811

Publication date:
23/11/2023
There is a buffer overflow in the password recovery feature of Hikvision NVR/DVR models. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.
Severity CVSS v4.0: Pending analysis
Last modification:
08/12/2023