Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-37858

Publication date:
09/08/2023
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing to decrypt an encrypted web application login password.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/12/2023

CVE-2023-37857

Publication date:
09/08/2023
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2023

CVE-2023-37856

Publication date:
09/08/2023
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem through a configuration dialog within the embedded Qt browser .<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2023

CVE-2023-37855

Publication date:
09/08/2023
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem within the embedded Qt browser.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2023

CVE-2023-26310

Publication date:
09/08/2023
There is a command injection problem in the old version of the mobile phone backup app.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2022-47185

Publication date:
09/08/2023
Improper input validation vulnerability on the range header in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-2905

Publication date:
09/08/2023
Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2023

CVE-2023-38752

Publication date:
09/08/2023
Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the attribute information of the poster that is set as"non-disclosure" in the system settings.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2023

CVE-2023-38751

Publication date:
09/08/2023
Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the organization information of the information receiver that is set as "non-disclosure" in the information provision operation.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2023

CVE-2023-4243

Publication date:
09/08/2023
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-4242

Publication date:
09/08/2023
The FULL - Customer plugin for WordPress is vulnerable to Information Disclosure via the /health REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to obtain sensitive information about the site configuration as disclosed by the WordPress health check.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-4239

Publication date:
09/08/2023
The Real Estate Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 7.2 due to insufficient restriction on the &amp;#39;rem_save_profile_front&amp;#39; function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the &amp;#39;wp_capabilities&amp;#39; parameter during a profile update.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026