Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-31973

Publication date:
09/05/2023
yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-31979

Publication date:
09/05/2023
Catdoc v0.95 was discovered to contain a global buffer overflow via the function process_file at /src/reader.c.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2026

CVE-2023-31126

Publication date:
09/05/2023
`org.xwiki.commons:xwiki-commons-xml` is an XML library used by the open-source wiki platform XWiki. The HTML sanitizer, introduced in version 14.6-rc-1, allows the injection of arbitrary HTML code and thus cross-site scripting via invalid data attributes. This vulnerability does not affect restricted cleaning in HTMLCleaner as there attributes are cleaned and thus characters like `/` and `>` are removed in all attribute names. This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by making sure that data attributes only contain allowed characters. There are no known workarounds apart from upgrading to a version including the fix.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-30899

Publication date:
09/05/2023
A vulnerability has been identified in Siveillance Video 2020 R2 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2023

CVE-2023-30898

Publication date:
09/05/2023
A vulnerability has been identified in Siveillance Video 2020 R2 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2023

CVE-2023-31974

Publication date:
09/05/2023
yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-31972

Publication date:
09/05/2023
yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-31975

Publication date:
09/05/2023
yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-30985

Publication date:
09/05/2023
A vulnerability has been identified in Solid Edge SE2023 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2023-30986

Publication date:
09/05/2023
A vulnerability has been identified in Solid Edge SE2023 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2023-2596

Publication date:
09/05/2023
A vulnerability was found in SourceCodester Online Reviewer System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /reviewer/system/system/admins/manage/users/user-update.php of the component GET Parameter Handler. The manipulation of the argument user_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228398 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2026

CVE-2023-29128

Publication date:
09/05/2023
A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 = V2.0
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2023