Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-34017

Publication date:
25/07/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FiveStarPlugins Five Star Restaurant Reservations plugin
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2023-3637

Publication date:
25/07/2023
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-3486

Publication date:
25/07/2023
An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host’s file storage. This could exhaust system resources and prevent the service from operating as expected.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2023-33925

Publication date:
25/07/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in PluginForage WooCommerce Product Categories Selection Widget plugin
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2023-23833

Publication date:
25/07/2023
Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Steven Henty Drop Shadow Boxes plugin
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2023-35043

Publication date:
25/07/2023
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Neha Goel Recent Posts Slider plugin
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2023-2850

Publication date:
25/07/2023
NodeBB is affected by a Cross-Site WebSocket Hijacking vulnerability due to missing validation of the request origin. Exploitation of this vulnerability allows certain user information to be extracted by attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2023

CVE-2023-3897

Publication date:
25/07/2023
Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.<br /> <br /> This issue affects SureMDM On-premise: 6.31 and below version
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-3890

Publication date:
25/07/2023
A vulnerability classified as problematic has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit-accepted-appointment.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235251.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-34189

Publication date:
25/07/2023
Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. The attacker could use general users to delete and update the process, which only the admin can operate occurrences. <br /> <br /> Users are advised to upgrade to Apache InLong&amp;#39;s 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8109  to solve it.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-35088

Publication date:
25/07/2023
Improper Neutralization of Special Elements Used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. <br /> In the toAuditCkSql method, the groupId, streamId, auditId, and dt are directly concatenated into the SQL query statement, which may lead to SQL injection attacks.<br /> Users are advised to upgrade to Apache InLong&amp;#39;s 1.8.0 or cherry-pick [1] to solve it.<br /> <br /> [1] https://github.com/apache/inlong/pull/8198
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-34434

Publication date:
25/07/2023
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. <br /> <br /> The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong&amp;#39;s 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8130 .
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025