Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-34336

Publication date:
12/06/2023
AMI BMC contains a vulnerability in the IPMI handler, where an<br /> attacker with the required privileges can cause a buffer overflow, which may<br /> lead to code execution, denial of service, or escalation of privileges.<br /> <br /> <br /> <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2023

CVE-2023-1323

Publication date:
12/06/2023
The Easy Forms for Mailchimp WordPress plugin before 6.8.9 does not sanitise and escape some of its from parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2025

CVE-2023-2362

Publication date:
12/06/2023
The Float menu WordPress plugin before 5.0.2, Bubble Menu WordPress plugin before 3.0.4, Button Generator WordPress plugin before 2.3.5, Calculator Builder WordPress plugin before 1.5.1, Counter Box WordPress plugin before 1.2.2, Floating Button WordPress plugin before 5.3.1, Herd Effects WordPress plugin before 5.2.2, Popup Box WordPress plugin before 2.2.2, Side Menu Lite WordPress plugin before 4.0.2, Sticky Buttons WordPress plugin before 3.1.1, Wow Skype Buttons WordPress plugin before 4.0.2, WP Coder WordPress plugin before 2.5.6 do not escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2023-0431

Publication date:
12/06/2023
The File Away WordPress plugin through 3.9.9.0.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-36331

Publication date:
12/06/2023
Western Digital My Cloud, My Cloud Home, My Cloud Home Duo, and SanDisk ibi devices were vulnerable to an impersonation attack that could allow an unauthenticated attacker to gain access to user data.<br /> This issue affects My Cloud OS 5 devices: before 5.25.132; My Cloud Home and My Cloud Home Duo: before 8.13.1-102; SanDisk ibi: before 8.13.1-102.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/06/2023

CVE-2023-34345

Publication date:
12/06/2023
AMI BMC contains a vulnerability in the SPX REST API, where an<br /> attacker with the required privileges can access arbitrary files, which may<br /> lead to information disclosure.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2023

CVE-2023-34344

Publication date:
12/06/2023
AMI BMC contains a vulnerability in the IPMI<br /> handler, where an unauthorized attacker can use certain oracles to guess a<br /> valid username, which may lead to information disclosure.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2023

CVE-2023-34341

Publication date:
12/06/2023
AMI BMC contains a vulnerability in the SPX REST API, where an<br /> attacker with the required privileges can read and write to arbitrary locations<br /> within the memory context of the IPMI server process, which may lead to code<br /> execution, denial of service, information disclosure, or data tampering.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2023

CVE-2023-34105

Publication date:
12/06/2023
SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS&amp;#39;s `api-server` server is vulnerable to a drive-by command injection. An attacker may send a request to the `/api/v1/snapshots` endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2023

CVE-2023-34246

Publication date:
12/06/2023
Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape. Prior to version 5.6.6, Doorkeeper automatically processes authorization requests without user consent for public clients that have been previous approved. Public clients are inherently vulnerable to impersonation, their identity cannot be assured. This issue is fixed in version 5.6.6.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2023-30198

Publication date:
12/06/2023
Prestashop winbizpayment
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2025

CVE-2023-34468

Publication date:
12/06/2023
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.<br /> <br /> The resolution validates the Database URL and rejects H2 JDBC locations.<br /> <br /> You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025