Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-3140

Publication date:
07/06/2023
Missing HTTP headers (X-Frame-Options, Content-Security-Policy) in KNIME<br /> Business Hub before 1.4.0 has left users vulnerable to click <br /> jacking. Clickjacking is an attack that occurs when an attacker uses a <br /> transparent iframe in a window to trick a user into clicking on an <br /> actionable item, such as a button or link, to another server in which <br /> they have an identical webpage. The attacker essentially hijacks the <br /> user activity intended for the original server and sends them to the <br /> other server.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023

CVE-2023-30576

Publication date:
07/06/2023
Apache Guacamole 0.9.10 through 1.5.1 may continue to reference a freed RDP audio input buffer. Depending on timing, this may allow an attacker to execute arbitrary code with the privileges of the guacd process.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/06/2023

CVE-2023-2541

Publication date:
07/06/2023
The Web Frontend of KNIME Business Hub before 1.4.0 allows an unauthenticated remote attacker to access internals about the application such as versions, host names, or IP addresses. No personal information or application data was exposed.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2023-30575

Publication date:
07/06/2023
Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2023

CVE-2023-1388

Publication date:
07/06/2023
<br /> A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/06/2023

CVE-2023-0976

Publication date:
07/06/2023
<br /> A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/06/2023

CVE-2023-2186

Publication date:
07/06/2023
On Triangle MicroWorks&amp;#39; SCADA Data Gateway version
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023

CVE-2023-2187

Publication date:
07/06/2023
On Triangle MicroWorks&amp;#39; SCADA Data Gateway version
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023

CVE-2023-33538

Publication date:
07/06/2023
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2023-33536

Publication date:
07/06/2023
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a buffer overflow via the component /userRpm/WlanMacFilterRpm.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2023-33537

Publication date:
07/06/2023
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a buffer overflow via the component /userRpm/FixMapCfgRpm.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2023-0666

Publication date:
07/06/2023
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025