Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-2527

Publication date:
19/06/2023
The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2779

Publication date:
19/06/2023
The Social Share, Social Login and Social Comments WordPress plugin before 7.13.52 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2805

Publication date:
19/06/2023
The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-2811

Publication date:
19/06/2023
The AI ChatBot WordPress plugin before 4.5.6 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks to all admin when setting chatbot and all client when using chatbot
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2023-2812

Publication date:
19/06/2023
The Ultimate Dashboard WordPress plugin before 3.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-2899

Publication date:
19/06/2023
The Google Map Shortcode WordPress plugin through 3.1.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34414

Publication date:
19/06/2023
The error page for sites with invalid TLS certificates was missing the<br /> activation-delay Firefox uses to protect prompts and permission dialogs<br /> from attacks that exploit human response time delays. If a malicious<br /> page elicited user clicks in precise locations immediately before<br /> navigating to a site with a certificate error and made the renderer<br /> extremely busy at the same time, it could create a gap between when<br /> the error page was loaded and when the display actually refreshed.<br /> With the right timing the elicited clicks could land in that gap and <br /> activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2024

CVE-2023-34415

Publication date:
19/06/2023
When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2024

CVE-2023-2359

Publication date:
19/06/2023
The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2399

Publication date:
19/06/2023
The QuBot WordPress plugin before 1.1.6 doesn&amp;#39;t filter user input on chat, leading to bad code inserted on it be reflected on the user dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2401

Publication date:
19/06/2023
The QuBot WordPress plugin before 1.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2492

Publication date:
19/06/2023
The QueryWall: Plug&amp;#39;n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024