Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-40890

Publication date:
29/08/2023
A stack-based buffer overflow vulnerability exists in the lookup_sequence function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-39615

Publication date:
29/08/2023
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-3646

Publication date:
29/08/2023
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-24548

Publication date:
29/08/2023
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-41362

Publication date:
29/08/2023
MyBB before 1.8.36 allows Code Injection by users with certain high privileges. Templates in Admin CP intentionally use eval, and there was some validation of the input to eval, but type juggling interfered with this when using PCRE within PHP.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2023

CVE-2023-41376

Publication date:
29/08/2023
Nokia Service Router Operating System (SR OS) 22.10 and SR Linux, when error-handling update-fault-tolerance is not enabled, mishandle BGP path attributes.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2023-38802

Publication date:
29/08/2023
FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2023

CVE-2023-38283

Publication date:
29/08/2023
In OpenBGPD before 8.1, incorrect handling of BGP update data (length of path attributes) set by a potentially distant remote actor may cause the system to incorrectly reset a session. This is fixed in OpenBSD 7.3 errata 006.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2021-32050

Publication date:
29/08/2023
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.<br /> <br /> Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).<br /> <br /> This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-0654

Publication date:
29/08/2023
Due to a misconfiguration, the WARP Mobile Client (
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-0238

Publication date:
29/08/2023
Due to lack of a security policy, the WARP Mobile Client (
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-40787

Publication date:
29/08/2023
In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
31/08/2023