Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-2520

Publication date:
04/05/2023
A vulnerability was found in Caton Prime 2.1.2.51.e8d7225049(202303031001) and classified as critical. This issue affects some unknown processing of the file cgi-bin/tools_ping.cgi?action=Command of the component Ping Handler. The manipulation of the argument Destination leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228011. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-2521

Publication date:
04/05/2023
A vulnerability was found in NEXTU NEXT-7004N 3.0.1. It has been classified as problematic. Affected is an unknown function of the file /boafrm/formFilter of the component POST Request Handler. The manipulation of the argument url with the input leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-228012. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-29994

Publication date:
04/05/2023
In NanoMQ v0.15.0-0, Heap overflow occurs in read_byte function of mqtt_code.c.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-29995

Publication date:
04/05/2023
In NanoMQ v0.15.0-0, a Heap overflow occurs in copyn_utf8_str function of mqtt_parser.c
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-29996

Publication date:
04/05/2023
In NanoMQ v0.15.0-0, segment fault with Null Pointer Dereference occurs in the process of decoding subinfo_decode and unsubinfo_decode.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-26012

Publication date:
04/05/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Denzel Chia | Phire Design Custom Login Page plugin
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2023

CVE-2023-30619

Publication date:
04/05/2023
Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-29827

Publication date:
04/05/2023
ejs v3.1.9 is vulnerable to server-side template injection. If the ejs file is controllable, template injection can be implemented through the configuration settings of the closeDelimiter parameter. NOTE: this is disputed by the vendor because the render function is not intended to be used with untrusted input.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-24958

Publication date:
04/05/2023
A vulnerability in the IBM TS7700 Management Interface 8.51.2.12, 8.52.200.111, 8.52.102.13, and 8.53.0.63 could allow an authenticated user to submit a specially crafted URL leading to privilege escalation and remote code execution. IBM X-Force ID: 246320.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-26010

Publication date:
04/05/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPMobile.App plugin
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2025

CVE-2023-23470

Publication date:
04/05/2023
IBM i 7.2, 7.3, 7.4, and 7.5 could allow an authenticated privileged administrator to gain elevated privileges in non-default configurations, as a result of improper SQL processing. By using a specially crafted SQL operation, the administrator could exploit the vulnerability to perform additional administrator operations. IBM X-Force ID: 244510.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-26016

Publication date:
04/05/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tauhidul Alam Simple Portfolio Gallery plugin
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2023