Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-45229

Publication date:
16/01/2024
EDK2&amp;#39;s Network Package is susceptible to an out-of-bounds read<br /> vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This<br /> vulnerability can be exploited by an attacker to gain unauthorized <br /> access and potentially lead to a loss of Confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-45230

Publication date:
16/01/2024
EDK2&amp;#39;s Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This<br /> vulnerability can be exploited by an attacker to gain unauthorized <br /> access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-45231

Publication date:
16/01/2024
EDK2&amp;#39;s Network Package is susceptible to an out-of-bounds read<br /> vulnerability when processing  Neighbor Discovery Redirect message. This<br /> vulnerability can be exploited by an attacker to gain unauthorized <br /> access and potentially lead to a loss of Confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2022-3764

Publication date:
16/01/2024
The plugin does not filter the "delete_entries" parameter from user requests, leading to an SQL Injection vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2022-3829

Publication date:
16/01/2024
The Font Awesome 4 Menus WordPress plugin through 4.7.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2022-3836

Publication date:
16/01/2024
The Seed Social WordPress plugin before 2.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2022-3899

Publication date:
16/01/2024
The 3dprint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious request that will delete any number of files or directories on the target server by tricking a logged in admin into submitting a form.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2025

CVE-2023-0079

Publication date:
16/01/2024
The Customer Reviews for WooCommerce WordPress plugin before 5.17.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2025

CVE-2023-0094

Publication date:
16/01/2024
The UpQode Google Maps WordPress plugin through 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2024

CVE-2023-0224

Publication date:
16/01/2024
The GiveWP WordPress plugin before 2.24.1 does not properly escape user input before it reaches SQL queries, which could let unauthenticated attackers perform SQL Injection attacks
Severity CVSS v4.0: Pending analysis
Last modification:
13/06/2025

CVE-2023-0376

Publication date:
16/01/2024
The Qubely WordPress plugin before 1.8.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2025

CVE-2023-0389

Publication date:
16/01/2024
The Calculated Fields Form WordPress plugin before 1.1.151 does not sanitise and escape some of its form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025