Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-29479

Publication date:
24/04/2023
Ribose RNP before 0.16.3 may hang when the input is malformed.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2023-24818

Publication date:
24/04/2023
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference. During forwarding of a fragment an uninitialized entry in the reassembly buffer is used. The NULL pointer dereference triggers a hard fault exception resulting in denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2023

CVE-2023-24819

Publication date:
24/04/2023
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-24820

Publication date:
24/04/2023
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. An attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset. Thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patch manually.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2023

CVE-2022-47158

Publication date:
24/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pakpobox alfred24 Click & Collect plugin
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2023

CVE-2022-47598

Publication date:
24/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Plugins Pro WP Super Popup plugin 
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2023

CVE-2022-45084

Publication date:
24/04/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Softaculous Loginizer plugin
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2023

CVE-2023-29570

Publication date:
24/04/2023
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-30368

Publication date:
24/04/2023
Tenda AC5 V15.03.06.28 is vulnerable to Buffer Overflow via the initWebs function.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-30369

Publication date:
24/04/2023
Tenda AC15 V15.03.05.19 is vulnerable to Buffer Overflow.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2023-1731

Publication date:
24/04/2023
In Meinbergs LTOS versions prior to V7.06.013, the configuration file upload function would not correctly validate the input, which would allow an remote authenticated attacker with high privileges to execute arbitrary commands.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/05/2023

CVE-2023-23892

Publication date:
24/04/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Jamie Poitra M Chart plugin
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2023