Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-20653

Publication date:
09/01/2024
Microsoft Common Log File System Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-0056

Publication date:
09/01/2024
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-0057

Publication date:
09/01/2024
NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2022-48618

Publication date:
09/01/2024
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2024-0228

Publication date:
09/01/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is a duplicate of CVE-2024-0193.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2024

CVE-2024-22164

Publication date:
09/01/2024
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2024-22165

Publication date:
09/01/2024
In Splunk Enterprise Security (ES) versions lower than 7.1.2, an attacker can create a malformed Investigation to perform a denial of service (DoS). The malformed investigation prevents the generation and rendering of the Investigations manager until it is deleted.The vulnerability requires an authenticated session and access to create an Investigation. It only affects the availability of the Investigations manager, but without the manager, the Investigations functionality becomes unusable for most users.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2024

CVE-2023-6129

Publication date:
09/01/2024
Issue summary: The POLY1305 MAC (message authentication code) implementation<br /> contains a bug that might corrupt the internal state of applications running<br /> on PowerPC CPU based platforms if the CPU provides vector instructions.<br /> <br /> Impact summary: If an attacker can influence whether the POLY1305 MAC<br /> algorithm is used, the application state might be corrupted with various<br /> application dependent consequences.<br /> <br /> The POLY1305 MAC (message authentication code) implementation in OpenSSL for<br /> PowerPC CPUs restores the contents of vector registers in a different order<br /> than they are saved. Thus the contents of some of these vector registers<br /> are corrupted when returning to the caller. The vulnerable code is used only<br /> on newer PowerPC processors supporting the PowerISA 2.07 instructions.<br /> <br /> The consequences of this kind of internal application state corruption can<br /> be various - from no consequences, if the calling application does not<br /> depend on the contents of non-volatile XMM registers at all, to the worst<br /> consequences, where the attacker could get complete control of the application<br /> process. However unless the compiler uses the vector registers for storing<br /> pointers, the most likely consequence, if any, would be an incorrect result<br /> of some application dependent calculations or a crash leading to a denial of<br /> service.<br /> <br /> The POLY1305 MAC algorithm is most frequently used as part of the<br /> CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)<br /> algorithm. The most common usage of this AEAD cipher is with TLS protocol<br /> versions 1.2 and 1.3. If this cipher is enabled on the server a malicious<br /> client can influence whether this AEAD cipher is used. This implies that<br /> TLS server applications using OpenSSL can be potentially impacted. However<br /> we are currently not aware of any concrete application that would be affected<br /> by this issue therefore we consider this a Low severity security issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-7222

Publication date:
09/01/2024
A vulnerability was found in Totolink X2000R 1.0.0-B20221212.1452. It has been declared as critical. This vulnerability affects the function formTmultiAP of the file /bin/boa of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249856. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-7223

Publication date:
09/01/2024
A vulnerability classified as problematic has been found in Totolink T6 4.1.9cu.5241_B20210923. This affects an unknown part of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input showSyslog leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249867. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2022-36763

Publication date:
09/01/2024
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2022-36764

Publication date:
09/01/2024
EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025