Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-45746

Publication date:
30/10/2023
Cross-site scripting vulnerability in Movable Type series allows a remote authenticated attacker to inject an arbitrary script. Affected products/versions are as follows: Movable Type 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Premium 1.58 and earlier, Movable Type Premium Advanced 1.58 and earlier, Movable Type Cloud Edition (Version 7) r.5405 and earlier, and Movable Type Premium Cloud Edition 1.58 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2024

CVE-2023-44141

Publication date:
30/10/2023
Inkdrop prior to v5.6.0 allows a local attacker to conduct a code injection attack by having a legitimate user open a specially crafted markdown file.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2023

CVE-2021-25736

Publication date:
30/10/2023
Kube-proxy<br /> on Windows can unintentionally forward traffic to local processes <br /> listening on the same port (“spec.ports[*].port”) as a LoadBalancer <br /> Service when the LoadBalancer controller<br /> does not set the “status.loadBalancer.ingress[].ip” field. Clusters <br /> where the LoadBalancer controller sets the <br /> “status.loadBalancer.ingress[].ip” field are unaffected.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2023-46866

Publication date:
30/10/2023
In International Color Consortium DemoIccMAX 79ecb74, CIccCLUT::Interp3d in IccProfLib/IccTagLut.cpp in libSampleICC.a attempts to access array elements at out-of-bounds indexes.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2023-46867

Publication date:
30/10/2023
In International Color Consortium DemoIccMAX 79ecb74, CIccXformMatrixTRC::GetCurve in IccCmm.cpp in libSampleICC.a has a NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2023-5842

Publication date:
30/10/2023
Cross-site Scripting (XSS) - Stored in GitHub repository dolibarr/dolibarr prior to 16.0.5.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-46865

Publication date:
30/10/2023
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2023

CVE-2023-44002

Publication date:
30/10/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-46863

Publication date:
30/10/2023
Peppermint Ticket Management before 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/users/file/download?filepath=./../ POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-46864

Publication date:
30/10/2023
Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-4393

Publication date:
30/10/2023
HTML and SMTP injections on the registration page of LiquidFiles versions 3.7.13 and below, allow an attacker to perform more advanced phishing attacks against an organization.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2007-10003

Publication date:
29/10/2023
A vulnerability, which was classified as critical, has been found in The Hackers Diet Plugin up to 0.9.6b on WordPress. This issue affects some unknown processing of the file ajax_blurb.php of the component HTTP POST Request Handler. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. Upgrading to version 0.9.7b is able to address this issue. The patch is named 7dd8acf7cd8442609840037121074425d363b694. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-243803.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024