Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-34341

Publication date:
12/06/2023
AMI BMC contains a vulnerability in the SPX REST API, where an<br /> attacker with the required privileges can read and write to arbitrary locations<br /> within the memory context of the IPMI server process, which may lead to code<br /> execution, denial of service, information disclosure, or data tampering.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2023

CVE-2023-34105

Publication date:
12/06/2023
SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS&amp;#39;s `api-server` server is vulnerable to a drive-by command injection. An attacker may send a request to the `/api/v1/snapshots` endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2023

CVE-2023-34246

Publication date:
12/06/2023
Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape. Prior to version 5.6.6, Doorkeeper automatically processes authorization requests without user consent for public clients that have been previous approved. Public clients are inherently vulnerable to impersonation, their identity cannot be assured. This issue is fixed in version 5.6.6.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2023-30198

Publication date:
12/06/2023
Prestashop winbizpayment
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2025

CVE-2023-34468

Publication date:
12/06/2023
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.<br /> <br /> The resolution validates the Database URL and rejects H2 JDBC locations.<br /> <br /> You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-35053

Publication date:
12/06/2023
In JetBrains YouTrack before 2023.1.10518 a DoS attack was possible via Helpdesk forms
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023

CVE-2023-35054

Publication date:
12/06/2023
In JetBrains YouTrack before 2023.1.10518 stored XSS in a Markdown-rendering engine was possible
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023

CVE-2023-34212

Publication date:
12/06/2023
The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.<br /> <br /> The resolution validates the JNDI URL and restricts locations to a set of allowed schemes.<br /> <br /> You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-28933

Publication date:
12/06/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in StPeteDesign Call Now Accessibility Button plugin
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023

CVE-2023-34026

Publication date:
12/06/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in BrokenCrust This Day In History plugin
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023

CVE-2023-29385

Publication date:
12/06/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kevon Adonis WP Abstracts plugin
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2026

CVE-2023-31236

Publication date:
12/06/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in unFocus Projects Scripts n Styles plugin
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2023