Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-26123

Publication date:
14/04/2023
Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the &amp;#39; character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function.<br /> <br /> **Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-1285

Publication date:
14/04/2023
Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are "16" allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2023

CVE-2023-29626

Publication date:
14/04/2023
Yoga Class Registration System 1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at /admin/login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-29627

Publication date:
14/04/2023
Online Pizza Ordering v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-29622

Publication date:
14/04/2023
Purchase Order Management v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /purchase_order/admin/login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-29625

Publication date:
14/04/2023
Employee Performance Evaluation System v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2025

CVE-2023-29623

Publication date:
14/04/2023
Purchase Order Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the password parameter at /purchase_order/classes/login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-29621

Publication date:
14/04/2023
Purchase Order Management v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-26969

Publication date:
14/04/2023
Atropim 1.5.26 is vulnerable to Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-29491

Publication date:
14/04/2023
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-2034

Publication date:
14/04/2023
Unrestricted Upload of File with Dangerous Type in GitHub repository froxlor/froxlor prior to 2.0.14.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2023

CVE-2023-29132

Publication date:
14/04/2023
Irssi 1.3.x and 1.4.x before 1.4.4 has a use-after-free because of use of a stale special collector reference. This occurs when printing of a non-formatted line is concurrent with printing of a formatted line.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025