Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-44220

Publication date:
27/10/2023
SonicWall NetExtender Windows (32-bit and 64-bit) client 10.2.336 and earlier versions have a DLL Search Order Hijacking vulnerability in the start-up DLL component. Successful exploitation via a local attacker could result in command execution in the target system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-46091

Publication date:
27/10/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bala Krishna, Sergey Yakovlev Category SEO Meta Tags plugin
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2023-46093

Publication date:
27/10/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in LionScripts.Com Webmaster Tools plugin
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2023-46153

Publication date:
27/10/2023
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in UserFeedback Team User Feedback plugin
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-46192

Publication date:
27/10/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Internet Marketing Ninjas Internal Link Building plugin
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2023-46194

Publication date:
27/10/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2023-46199

Publication date:
27/10/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Triberr plugin
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2023-34059

Publication date:
27/10/2023
open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the <br /> /dev/uinput file descriptor allowing them to simulate user inputs.
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2023-34057

Publication date:
27/10/2023
VMware Tools contains a local privilege escalation vulnerability. A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2023-34058

Publication date:
27/10/2023
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2023-45498

Publication date:
27/10/2023
VinChin Backup &amp; Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.* was discovered to contain a command injection vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2023-45499

Publication date:
27/10/2023
VinChin Backup &amp; Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.* was discovered to contain hardcoded credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2023