Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-30378

Publication date:
24/04/2023
In Tenda AC15 V15.03.05.19, the function "sub_8EE8" contains a stack-based buffer overflow vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2023-2251

Publication date:
24/04/2023
Uncaught Exception in GitHub repository eemeli/yaml prior to 2.0.0-5.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2023-30370

Publication date:
24/04/2023
In Tenda AC15 V15.03.05.19, the function GetValue contains a stack-based buffer overflow vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-29480

Publication date:
24/04/2023
Ribose RNP before 0.16.3 sometimes lets secret keys remain unlocked after use.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-29849

Publication date:
24/04/2023
Bang Resto 1.0 was discovered to contain multiple SQL injection vulnerabilities via the btnMenuItemID, itemID, itemPrice, menuID, staffID, or itemqty parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-29848

Publication date:
24/04/2023
Bang Resto 1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the itemName parameter in the admin/menu.php Add New Menu function.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-29479

Publication date:
24/04/2023
Ribose RNP before 0.16.3 may hang when the input is malformed.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2023-24818

Publication date:
24/04/2023
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference. During forwarding of a fragment an uninitialized entry in the reassembly buffer is used. The NULL pointer dereference triggers a hard fault exception resulting in denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2023

CVE-2023-24819

Publication date:
24/04/2023
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-24820

Publication date:
24/04/2023
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. An attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset. Thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patch manually.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2023

CVE-2022-47158

Publication date:
24/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pakpobox alfred24 Click & Collect plugin
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2023

CVE-2022-47598

Publication date:
24/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Plugins Pro WP Super Popup plugin 
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2023