Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-34887

Publication date:
27/10/2023
Standard users can directly operate and set printer configuration information , such as IP, in some Lenovo Printers without having to authenticate with the administrator password.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-5826

Publication date:
27/10/2023
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/list_onlineuser.php. The manipulation of the argument SessionId leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243716. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-5827

Publication date:
27/10/2023
A vulnerability was found in Shanghai CTI Navigation CTI Monitoring and Early Warning System 2.2. It has been classified as critical. This affects an unknown part of the file /Web/SysManage/UserEdit.aspx. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-243717 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-46604

Publication date:
27/10/2023
The Java OpenWire protocol marshaller is vulnerable to Remote Code <br /> Execution. This vulnerability may allow a remote attacker with network <br /> access to either a Java-based OpenWire broker or client to run arbitrary<br /> shell commands by manipulating serialized class types in the OpenWire <br /> protocol to cause either the client or the broker (respectively) to <br /> instantiate any class on the classpath.<br /> <br /> Users are recommended to upgrade<br /> both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 <br /> which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-46393

Publication date:
27/10/2023
gougucms v4.08.18 was discovered to contain a password reset poisoning vulnerability which allows attackers to arbitrarily reset users&amp;#39; passwords via a crafted packet.
Severity CVSS v4.0: Pending analysis
Last modification:
12/09/2024

CVE-2023-46394

Publication date:
27/10/2023
A stored cross-site scripting (XSS) vulnerability in /home/user/edit_submit of gougucms v4.08.18 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the headimgurl parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2023-5443

Publication date:
27/10/2023
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in EDM Informatics E-invoice allows Account Footprinting.This issue affects E-invoice: before 2.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-44376

Publication date:
27/10/2023
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2024

CVE-2023-44377

Publication date:
27/10/2023
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2024

CVE-2023-5807

Publication date:
27/10/2023
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in TRtek Software Education Portal allows SQL Injection.<br /> <br /> This issue affects Education Portal: before 3.2023.29.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2026

CVE-2023-5821

Publication date:
27/10/2023
The Thumbnail carousel slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing nonce validation on the deleteselected function. This makes it possible for unauthenticated attackers to delete sliders in bulk via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-5570

Publication date:
27/10/2023
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.This issue affects Home Manager Gateway: before v.1.27.12.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024