Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-23676

Publication date:
22/01/2024
In Splunk versions below 9.0.8 and 9.1.3, the “mrollup” SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2024

CVE-2024-23677

Publication date:
22/01/2024
In Splunk Enterprise versions below 9.0.8, the Splunk RapidDiag utility discloses server responses from external applications in a log file.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2024

CVE-2024-23678

Publication date:
22/01/2024
In Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3, Splunk Enterprise does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2024

CVE-2023-47141

Publication date:
22/01/2024
IIBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query. IBM X-Force ID: 270264.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2024

CVE-2023-24135

Publication date:
22/01/2024
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a command injection vulnerability in the function formWriteFacMac. This vulnerability allows attackers to execute arbitrary commands via manipulation of the mac parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2023-47158

Publication date:
22/01/2024
IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) <br /> <br /> 10.5, 11.1 and 11.5<br /> <br /> could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query. IBM X-Force ID: 270750.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2024

CVE-2023-47747

Publication date:
22/01/2024
IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.1, 10.5, and 11.1 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query. IBM X-Force ID: 272646.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2024

CVE-2023-6290

Publication date:
22/01/2024
The SEOPress WordPress plugin before 7.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2023-6384

Publication date:
22/01/2024
The WP User Profile Avatar WordPress plugin before 1.0.1 does not properly check for authorisation, allowing authors to delete and update arbitrary avatar
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2023-6447

Publication date:
22/01/2024
The EventPrime WordPress plugin before 3.3.6 lacks authentication and authorization, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id/event name.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2023-6456

Publication date:
22/01/2024
The WP Review Slider WordPress plugin before 13.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2023-6625

Publication date:
22/01/2024
The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not have a CSRF check in place when deleting inquiries, which could allow attackers to make a logged in admin delete them via a CSRF attack
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025