Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-32621

Publication date:
30/06/2023
WL-WN531AX2 firmware versions prior to 2023526 allows an attacker with an administrative privilege to upload arbitrary files and execute OS commands with the root privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
06/07/2023

CVE-2023-32622

Publication date:
30/06/2023
Improper neutralization of special elements in WL-WN531AX2 firmware versions prior to 2023526 allows an attacker with an administrative privilege to execute OS commands with the root privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2024

CVE-2023-26135

Publication date:
30/06/2023
All versions of the package flatnest are vulnerable to Prototype Pollution via the nest() function in the flatnest/nest.js file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2024

CVE-2023-2846

Publication date:
30/06/2023
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023

CVE-2023-36539

Publication date:
30/06/2023
Exposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2023-32607

Publication date:
30/06/2023
Stored cross-site scripting vulnerability in Pleasanter (Community Edition and Enterprise Edition) 1.3.39.2 and earlier versions allows a remote authenticated attacker to inject an arbitrary script.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2023

CVE-2023-32608

Publication date:
30/06/2023
Directory traversal vulnerability in Pleasanter (Community Edition and Enterprise Edition) 1.3.39.2 and earlier versions allows a remote authenticated attacker to alter an arbitrary file on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2023

CVE-2023-36347

Publication date:
30/06/2023
A broken authentication mechanism in the endpoint excel.php of POS Codekop v2.0 allows unauthenticated attackers to download selling data.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2023

CVE-2023-33336

Publication date:
30/06/2023
Reflected cross site scripting (XSS) vulnerability was discovered in Sophos Web Appliance v4.3.9.1 that allows for arbitrary code to be inputted via the double quotes.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-3063

Publication date:
30/06/2023
The SP Project & Document Manager plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.67. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with subscriber privileges or above, to change user passwords and potentially take over administrator accounts.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-3249

Publication date:
30/06/2023
The Web3 – Crypto wallet Login & NFT token gating plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.6.0. This is due to incorrect authentication checking in the 'hidden_form_data' function. This makes it possible for authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2020-18432

Publication date:
30/06/2023
File Upload vulnerability in SEMCMS PHP 3.7 allows remote attackers to upload arbitrary files and gain escalated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2023