Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52026

Publication date:
12/01/2024
TOTOlink EX1800T V9.1.0cu.2112_B20220316 was discovered to contain a remote command execution (RCE) vulnerability via the telnet_enabled parameter of the setTelnetCfg interface
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2023-49569

Publication date:
12/01/2024
A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved.<br /> <br /> Applications are only affected if they are using the ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using "Plain" versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue.<br /> This is a go-git implementation issue and does not affect the upstream git cli.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2024

CVE-2023-49568

Publication date:
12/01/2024
A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients.<br /> <br /> Applications using only the in-memory filesystem supported by go-git are not affected by this vulnerability.<br /> This is a go-git implementation issue and does not affect the upstream git cli.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2024

CVE-2023-30015

Publication date:
12/01/2024
SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via txtsearch parameter in review_search.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-30016

Publication date:
12/01/2024
SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_details_edit.php.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-48909

Publication date:
12/01/2024
An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2025

CVE-2023-30014

Publication date:
12/01/2024
SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-31211

Publication date:
12/01/2024
Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-40362

Publication date:
12/01/2024
An issue was discovered in CentralSquare Click2Gov Building Permit before October 2023. Lack of access control protections allows remote attackers to arbitrarily delete the contractors from any user&amp;#39;s account when the user ID and contractor information is known.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-50919

Publication date:
12/01/2024
An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-50920

Publication date:
12/01/2024
An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2023-6735

Publication date:
12/01/2024
Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024