Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-5842

Publication date:
30/10/2023
Cross-site Scripting (XSS) - Stored in GitHub repository dolibarr/dolibarr prior to 16.0.5.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-46865

Publication date:
30/10/2023
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2023

CVE-2023-44002

Publication date:
30/10/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-46863

Publication date:
30/10/2023
Peppermint Ticket Management before 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/users/file/download?filepath=./../ POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-46864

Publication date:
30/10/2023
Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-4393

Publication date:
30/10/2023
HTML and SMTP injections on the registration page of LiquidFiles versions 3.7.13 and below, allow an attacker to perform more advanced phishing attacks against an organization.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2007-10003

Publication date:
29/10/2023
A vulnerability, which was classified as critical, has been found in The Hackers Diet Plugin up to 0.9.6b on WordPress. This issue affects some unknown processing of the file ajax_blurb.php of the component HTTP POST Request Handler. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. Upgrading to version 0.9.7b is able to address this issue. The patch is named 7dd8acf7cd8442609840037121074425d363b694. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-243803.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2005-10002

Publication date:
29/10/2023
A vulnerability, which was classified as critical, was found in almosteffortless secure-files Plugin up to 1.1 on WordPress. Affected is the function sf_downloads of the file secure-files.php. The manipulation of the argument downloadfile leads to path traversal. Upgrading to version 1.2 is able to address this issue. The name of the patch is cab025e5fc2bcdad8032d833ebc38e6bd2a13c92. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-243804.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2024

CVE-2021-33634

Publication date:
29/10/2023
iSulad uses the lcr+lxc runtime (default) to run malicious images, which can cause DOS.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2021-33635

Publication date:
29/10/2023
When malicious images are pulled by isula pull, attackers can execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2021-33636

Publication date:
29/10/2023
<br /> When the isula load command is used to load malicious images, attackers can execute arbitrary code.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2021-33637

Publication date:
29/10/2023
<br /> When the isula export command is used to export a container to an image and the container is controlled by an attacker, the attacker can escape the container.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023