Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-20897

Publication date:
05/09/2023
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-38569

Publication date:
05/09/2023
Stored cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2023

CVE-2023-36492

Publication date:
05/09/2023
Reflected cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2023

CVE-2023-39938

Publication date:
05/09/2023
Reflected cross-site scripting vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to inject an arbitrary script.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2023

CVE-2023-40705

Publication date:
05/09/2023
Stored cross-site scripting vulnerability in Map setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2023

CVE-2023-40535

Publication date:
05/09/2023
Stored cross-site scripting vulnerability in View setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2023

CVE-2023-39448

Publication date:
05/09/2023
Path traversal vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to alter or create arbitrary files on the server, resulting in arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2023

CVE-2023-38574

Publication date:
05/09/2023
Open redirect vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2023

CVE-2023-4540

Publication date:
05/09/2023
Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. <br /> Such a request causes the program to enter an infinite loop. <br /> <br /> This issue affects lua-http: all versions before commit ddab283.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2023-33020

Publication date:
05/09/2023
Transient DOS in WLAN Host when an invalid channel (like channel out of range) is received in STA during CSA IE.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2023-33021

Publication date:
05/09/2023
Memory corruption in Graphics while processing user packets for command submission.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2023-41910

Publication date:
05/09/2023
An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023