Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-34040

Publication date:
24/08/2023
In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers.<br /> <br /> Specifically, an application is vulnerable when all of the following are true:<br /> <br /> * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record<br /> * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true.<br /> * The user allows untrusted sources to publish to a Kafka topic<br /> <br /> <br /> By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-32510

Publication date:
24/08/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van Gelder Order Your Posts Manually plugin
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023

CVE-2023-32511

Publication date:
24/08/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking Ultra Pro Booking Ultra Pro Appointments Booking Calendar Plugin plugin
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023

CVE-2023-32516

Publication date:
24/08/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFood Restaurant Menu – Food Ordering System – Table Reservation plugin
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2023

CVE-2023-38288

Publication date:
24/08/2023
Rejected reason: Not a Security Issue.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-38289

Publication date:
24/08/2023
Rejected reason: Not a Security Issue.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-3705

Publication date:
24/08/2023
The vulnerability exists in CP-Plus NVR due to an improper input handling at the web-based management interface of the affected product. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.<br /> <br /> Successful exploitation of this vulnerability could allow the remote attacker to obtain sensitive information on the targeted device.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2023-4230

Publication date:
24/08/2023
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which has the potential to facilitate the collection of information on ioLogik 4000 Series devices. This vulnerability may enable attackers to gather information for the purpose of assessing vulnerabilities and potential attack vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2023

CVE-2023-4511

Publication date:
24/08/2023
BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2023-4512

Publication date:
24/08/2023
CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2023-4513

Publication date:
24/08/2023
BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2023-3704

Publication date:
24/08/2023
The vulnerability exists in CP-Plus DVR due to an improper input validation within the web-based management interface of the affected products. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.<br /> <br /> Successful exploitation of this vulnerability could allow the remote attacker to change system time of the targeted device.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2023