Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-30306

Publication date:
28/05/2024
An issue discovered in Mercury x30g, Mercury YR1800XG routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-30307

Publication date:
28/05/2024
An issue discovered in TP-LINK TL-R473GP-AC, TP-LINK XDR6020, TP-LINK TL-R479GP-AC, TP-LINK TL-R4239G, TP-LINK TL-WAR1200L, and TP-LINK TL-R476G routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2023-30308

Publication date:
28/05/2024
An issue discovered in Ruijie EG210G-P, Ruijie EG105G-V2, Ruijie NBR, and Ruijie EG105G routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
13/08/2025

CVE-2023-30309

Publication date:
28/05/2024
An issue discovered in D-Link DI-7003GV2 routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2023-30310

Publication date:
28/05/2024
An issue discovered in Comfast Comfast CF-616AC routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2024

CVE-2023-30313

Publication date:
28/05/2024
An issue discovered in Wavlink QUANTUM D2G routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2024

CVE-2023-46694

Publication date:
28/05/2024
Vtenext 21.02 allows an authenticated attacker to upload arbitrary files, potentially enabling them to execute remote commands. This flaw exists due to the application's failure to enforce proper authentication controls when accessing the Ckeditor file manager functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2022-45171

Publication date:
28/05/2024
An issue was discovered in LIVEBOX Collaboration vDesk through v018. An Unrestricted Upload of a File with a Dangerous Type can occur under the vShare web site section. A remote user, authenticated to the product, can arbitrarily upload potentially dangerous files without restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-36110

Publication date:
28/05/2024
ansibleguy-webui is an open source WebUI for using Ansible. Multiple forms in versions
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-5433

Publication date:
28/05/2024
The Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches a given expression. A specially crafted expression can lead to a path traversal vulnerability. This command combined with a specially crafted expression allows anonymous, unauthenticated access (allowed by default) by an attacker to files and directories outside of the webserver root directory they should be restricted to.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-5434

Publication date:
28/05/2024
The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-24919

Publication date:
28/05/2024
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025