Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-33312

Publication date:
18/07/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wppal Easy Captcha plugin
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-33329

Publication date:
18/07/2023
Auth. (admin+) Reflected Cross-Site Scripting (XSS) vulnerability in Hijiri Custom Post Type Generator plugin
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-28019

Publication date:
18/07/2023
Insufficient validation in Bigfix WebUI API App site version
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2021-37522

Publication date:
18/07/2023
SQL injection vulnerability in HKing2802 Locke-Bot 2.0.2 allows remote attackers to run arbitrary SQL commands via crafted string to /src/db.js, /commands/mute.js, /modules/event/messageDelete.js.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2020-22159

Publication date:
18/07/2023
EVERTZ devices 3080IPX exe-guest-v1.2-r26125, 7801FC 1.3 Build 27, and 7890IXG V494 are vulnerable to Arbitrary File Upload, allowing an authenticated attacker to upload a webshell or overwrite any critical system files.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-33231

Publication date:
18/07/2023
XSS attack was possible in DPA 2023.2 due to insufficient input validation
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2023

CVE-2023-0160

Publication date:
18/07/2023
A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-37259

Publication date:
18/07/2023
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored Cross site scripting (XSS). Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact. However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side. This issue has been addressed in commit `22fcd34c60` which is included in release version 3.76.0. Users are advised to upgrade. The only known workaround for this issue is to disable or to not use the Export Chat feature.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2021-4428

Publication date:
18/07/2023
A vulnerability has been found in what3words Autosuggest Plugin up to 4.0.0 on WordPress and classified as problematic. Affected by this vulnerability is the function enqueue_scripts of the file w3w-autosuggest/public/class-w3w-autosuggest-public.php of the component Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 4.0.1 is able to address this issue. The patch is named dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-234247.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-34035

Publication date:
18/07/2023
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)<br /> <br /> Specifically, an application is vulnerable when all of the following are true:<br /> <br /> * Spring MVC is on the classpath<br /> * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)<br /> * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints<br /> <br /> <br /> An application is not vulnerable if any of the following is true:<br /> <br /> * The application does not have Spring MVC on the classpath<br /> * The application secures no servlets other than Spring MVC’s DispatcherServlet<br /> * The application uses requestMatchers(String) only for Spring MVC endpoints<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-2263

Publication date:
18/07/2023
<br /> The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing.  The new ENIP connections cannot be established if impacted by this vulnerability,  which prohibits operational capabilities of the device resulting in a denial-of-service attack.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2023

CVE-2023-33265

Publication date:
18/07/2023
In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, executor services don&amp;#39;t check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025