Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-42138

Publication date:
11/10/2023
Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-4990

Publication date:
11/10/2023
Directory traversal vulnerability in MCL-Net versions prior to 4.6 Update Package (P01) may allow attackers to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2023-44997

Publication date:
11/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in Nitin Rathod WP Forms Puzzle Captcha plugin
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2023

CVE-2023-26319

Publication date:
11/10/2023
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Xiaomi Xiaomi Router allows Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2023-26320

Publication date:
11/10/2023
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Xiaomi Xiaomi Router allows Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2023-37536

Publication date:
11/10/2023
An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2022-44757

Publication date:
11/10/2023
BigFix Insights for Vulnerability Remediation (IVR) uses weak cryptography that can lead to credential exposure. An attacker could gain access to sensitive information, modify data in unexpected ways, etc.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2023

CVE-2022-44758

Publication date:
11/10/2023
BigFix Insights/IVR fixlet uses improper credential handling within certain fixlet content. An attacker can gain access to information that is not explicitly authorized.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2023

CVE-2023-26318

Publication date:
11/10/2023
Buffer Copy without Checking Size of Input (&amp;#39;Classic Buffer Overflow&amp;#39;) vulnerability in Xiaomi Xiaomi Router allows Overflow Buffers.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2023

CVE-2022-42451

Publication date:
11/10/2023
Certain credentials within the BigFix Patch Management Download Plug-ins are stored insecurely and could be exposed to a local privileged user.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2024

CVE-2023-44689

Publication date:
11/10/2023
e-Gov Client Application (Windows version) versions prior to 2.1.1.0 and e-Gov Client Application (macOS version) versions prior to 1.1.1.0 are vulnerable to improper authorization in handler for custom URL scheme. A crafted URL may direct the product to access an arbitrary website. As a result, the user may become a victim of a phishing attack.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-45194

Publication date:
11/10/2023
Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2023