Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-27711

Publication date:
16/03/2023
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via the Comment Manager /admin/manage-comments.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27783

Publication date:
16/03/2023
An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27784

Publication date:
16/03/2023
An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause a denial of service via the read_hexstring function at the utils.c:309 endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27785

Publication date:
16/03/2023
An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse endpoints function.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27786

Publication date:
16/03/2023
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27787

Publication date:
16/03/2023
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2020-19947

Publication date:
16/03/2023
Cross Site Scripting vulnerability found in Markdown Edit allows a remote attacker to execute arbitrary code via the edit parameter of the webpage.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2020-22647

Publication date:
16/03/2023
An issue found in DepositGame v.1.0 allows an attacker to gain sensitive information via the GetBonusWithdraw and withdraw functions.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27250

Publication date:
16/03/2023
Online Book Store Project v1.0 is vulnerable to SQL Injection via /bookstore/bookPerPub.php.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-27875

Publication date:
16/03/2023
IBM Aspera Faspex 5.0.4 could allow a user to change other user's credentials due to improper access controls. IBM X-Force ID: 249847.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-1433

Publication date:
16/03/2023
A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/products/controller.php?action=add of the component Products Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223215.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-1431

Publication date:
16/03/2023
The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023