Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4047

Publication date:
01/08/2023
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2024

CVE-2023-4048

Publication date:
01/08/2023
An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2024

CVE-2023-34634

Publication date:
01/08/2023
Greenshot 1.2.10 and below allows arbitrary code execution because .NET content is insecurely deserialized when a .greenshot file is opened.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025

CVE-2023-31710

Publication date:
01/08/2023
TP-Link Archer AX21(US)_V3_1.1.4 Build 20230219 and AX21(US)_V3.6_1.1.4 Build 20230219 are vulnerable to Buffer Overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2023-39110

Publication date:
01/08/2023
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path parameter at /ajaxGetFileByPath.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2023-39109

Publication date:
01/08/2023
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2023-39108

Publication date:
01/08/2023
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_b parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2022-39987

Publication date:
01/08/2023
A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the "entity" POST parameters in /ajax/networking/get_wgkey.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-39986

Publication date:
01/08/2023
A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-37478

Publication date:
01/08/2023
pnpm is a package manager. It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm. This issue has been patched in version(s) 7.33.4 and 8.6.8.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2023-32302

Publication date:
01/08/2023
Rejected reason: Authoritative user requested CVE rejection<br /> https://github.com/github/advisory-database/pull/2575#issuecomment-1745811653
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-23548

Publication date:
01/08/2023
Reflected XSS in business intelligence in Checkmk
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2024