Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-22813

Publication date:
08/05/2023
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> A device API<br /> endpoint was missing access controls on Western Digital My Cloud OS 5 iOS and Anroid Mobile Apps, My Cloud Home iOS and Android Mobile Apps, SanDisk ibi iOS and Android Mobile Apps, My Cloud OS 5 Web App, My Cloud Home Web App and the SanDisk ibi Web App. Due to a permissive CORS policy<br /> and missing authentication requirement for private IPs, a remote attacker on<br /> the same network as the device could obtain device information by convincing a<br /> victim user to visit an attacker-controlled server and issue a cross-site<br /> request.<br /> <br /> <br /> <br /> This issue affects<br /> My Cloud OS 5 Mobile App: before 4.21.0; My Cloud Home Mobile App: before 4.21.0; ibi Mobile App: before 4.21.0; My<br /> Cloud OS 5 Web App: before 4.26.0-6126; My Cloud Home Web App: before 4.26.0-6126;<br /> ibi Web App: before 4.26.0-6126.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2023

CVE-2023-24376

Publication date:
08/05/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Nico Graff WP Simple Events plugin
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2023

CVE-2023-23894

Publication date:
08/05/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Surbma Surbma | GDPR Proof Cookie Consent &amp; Notice Bar plugin
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2023

CVE-2023-31183

Publication date:
08/05/2023
<br /> Cybonet PineApp Mail Secure A reflected cross-site scripting (XSS) vulnerability was identified in the product, using an unspecified endpoint.<br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2023

CVE-2023-31181

Publication date:
08/05/2023
<br /> WJJ Software - InnoKB Server, InnoKB/Console 2.2.1 - CWE-22: Path Traversal<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2023

CVE-2023-31180

Publication date:
08/05/2023
<br /> WJJ Software - InnoKB Server, InnoKB/Console 2.2.1 - Reflected cross-site scripting (RXSS) through an unspecified request.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2023

CVE-2023-31182

Publication date:
08/05/2023
<br /> EasyTor Applications – Authorization Bypass - EasyTor Applications may allow authorization bypass via unspecified method.<br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2023

CVE-2023-2582

Publication date:
08/05/2023
A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user&amp;#39;s browser.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-2513

Publication date:
08/05/2023
A use-after-free vulnerability was found in the Linux kernel&amp;#39;s ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2023-31129

Publication date:
08/05/2023
The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module `os/net/ipv6/uip-nd6.c`. The ND protocol includes a message type called Router Solicitation (RS), which is used to locate routers and update their address information via the SLLAO (Source Link-Layer Address Option). If the indicated source address changes, a given neighbor entry is set to the STALE state.<br /> <br /> The message handler does not check for RS messages with an SLLAO that indicates a link-layer address change that a neighbor entry can actually be created for the indicated address. The resulting pointer is used without a check, leading to the dereference of a NULL pointer of type `uip_ds6_nbr_t`.<br /> <br /> The problem has been patched in the `develop` branch of Contiki-NG, and will be included in the upcoming 4.9 release. As a workaround, users can apply Contiki-NG pull request #2271 to patch the problem directly.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2023

CVE-2023-31123

Publication date:
08/05/2023
`effectindex/tripreporter` is a community-powered, universal platform for submitting and analyzing trip reports. Prior to commit bd80ba833b9023d39ca22e29874296c8729dd53b, any user with an account on an instance of `effectindex/tripreporter`, e.g. `subjective.report`, may be affected by an improper password verification vulnerability. The vulnerability allows any user with a password matching the password requirements to log in as any user. This allows access to accounts / data loss of the user. This issue is patched in commit bd80ba833b9023d39ca22e29874296c8729dd53b. No action necessary for users of `subjective.report`, and anyone running their own instance should update to this commit or newer as soon as possible. As a workaround, someone running their own instance may apply the patch manually.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2023

CVE-2023-31179

Publication date:
08/05/2023
AgilePoint NX v8.0 SU2.2 &amp; SU2.3 - Path traversal - Vulnerability allows path traversal and downloading files from the server, by an unspecified request.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2023