Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-2899

Publication date:
19/06/2023
The Google Map Shortcode WordPress plugin through 3.1.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34414

Publication date:
19/06/2023
The error page for sites with invalid TLS certificates was missing the<br /> activation-delay Firefox uses to protect prompts and permission dialogs<br /> from attacks that exploit human response time delays. If a malicious<br /> page elicited user clicks in precise locations immediately before<br /> navigating to a site with a certificate error and made the renderer<br /> extremely busy at the same time, it could create a gap between when<br /> the error page was loaded and when the display actually refreshed.<br /> With the right timing the elicited clicks could land in that gap and <br /> activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2024

CVE-2023-34415

Publication date:
19/06/2023
When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2024

CVE-2023-2359

Publication date:
19/06/2023
The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2399

Publication date:
19/06/2023
The QuBot WordPress plugin before 1.1.6 doesn&amp;#39;t filter user input on chat, leading to bad code inserted on it be reflected on the user dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2401

Publication date:
19/06/2023
The QuBot WordPress plugin before 1.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2492

Publication date:
19/06/2023
The QueryWall: Plug&amp;#39;n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2600

Publication date:
19/06/2023
The Custom Base Terms WordPress plugin before 1.0.3 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2023-2654

Publication date:
19/06/2023
The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2684

Publication date:
19/06/2023
The File Renaming on Upload WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2023-2719

Publication date:
19/06/2023
The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-2742

Publication date:
19/06/2023
The AI ChatBot WordPress plugin before 4.5.5 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025