Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-34064

Publication date:
24/02/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-33563. Reason: This candidate is a duplicate of CVE-2021-33563. Notes: All CVE users should reference CVE-2021-33563 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0585

Publication date:
24/02/2023
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator role or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-0586

Publication date:
24/02/2023
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor+ role to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2022-43923

Publication date:
24/02/2023
IBM Maximo Application Suite 8.8.0 and 8.9.0 stores potentially sensitive information that could be read by a local user. IBM X-Force ID: 241584.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-4203

Publication date:
24/02/2023
A read buffer overrun can be triggered in X.509 certificate verification,<br /> specifically in name constraint checking. Note that this occurs<br /> after certificate chain signature verification and requires either a<br /> CA to have signed the malicious certificate or for the application to<br /> continue certificate verification despite failure to construct a path<br /> to a trusted issuer.<br /> <br /> The read buffer overrun might result in a crash which could lead to<br /> a denial of service attack. In theory it could also result in the disclosure<br /> of private memory contents (such as private keys, or sensitive plaintext)<br /> although we are not aware of any working exploit leading to memory<br /> contents disclosure as of the time of release of this advisory.<br /> <br /> In a TLS client, this can be triggered by connecting to a malicious<br /> server. In a TLS server, this can be triggered if the server requests<br /> client authentication and a malicious client connects.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-25956

Publication date:
24/02/2023
Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider.<br /> <br /> This issue affects Apache Airflow AWS Provider versions before 7.2.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2024

CVE-2023-25691

Publication date:
24/02/2023
Improper Input Validation vulnerability in the Apache Airflow Google Provider.<br /> <br /> This issue affects Apache Airflow Google Provider versions before 8.10.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2025

CVE-2023-25692

Publication date:
24/02/2023
Improper Input Validation vulnerability in the Apache Airflow Google Provider.<br /> <br /> This issue affects Apache Airflow Google Provider versions before 8.10.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2025

CVE-2023-25693

Publication date:
24/02/2023
Improper Input Validation vulnerability in the Apache Airflow Sqoop Provider.<br /> <br /> This issue affects Apache Airflow Sqoop Provider versions before 3.1.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-25696

Publication date:
24/02/2023
Improper Input Validation vulnerability in the Apache Airflow Hive Provider.<br /> <br /> This issue affects Apache Airflow Hive Provider versions before 5.1.3.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2024

CVE-2021-4105

Publication date:
24/02/2023
Improper Handling of Parameters vulnerability in BG-TEK COSLAT Firewall allows Remote Code Inclusion.This issue affects COSLAT Firewall: from 5.24.0.R.20180630 before 5.24.0.R.20210727.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-1010

Publication date:
24/02/2023
A vulnerability classified as critical was found in vox2png 1.0. Affected by this vulnerability is an unknown functionality of the file vox2png.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221743.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024