Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-2235

Publication date:
01/05/2023
A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.<br /> <br /> The perf_group_detach function did not check the event&amp;#39;s siblings&amp;#39; attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.<br /> <br /> We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2023

CVE-2023-2248

Publication date:
01/05/2023
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-2236

Publication date:
01/05/2023
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.<br /> <br /> Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.<br /> <br /> We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2018-25085

Publication date:
01/05/2023
A vulnerability classified as problematic was found in Responsive Menus 7.x-1.x-dev on Drupal. Affected by this vulnerability is the function responsive_menus_admin_form_submit of the file responsive_menus.module of the component Configuration Setting Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 7.x-1.7 is able to address this issue. The patch is named 3c554b31d32a367188f44d44857b061eac949fb8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-227755.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2015-10105

Publication date:
01/05/2023
A vulnerability, which was classified as critical, was found in IP Blacklist Cloud Plugin up to 3.42 on WordPress. This affects the function valid_js_identifier of the file ip_blacklist_cloud.php of the component CSV File Import. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. Upgrading to version 3.43 is able to address this issue. The identifier of the patch is 6e6fe8c6fda7cbc252eef083105e08d759c07312. It is recommended to upgrade the affected component. The identifier VDB-227757 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2015-10104

Publication date:
30/04/2023
A vulnerability, which was classified as problematic, has been found in Icons for Features Plugin 1.0.0 on WordPress. Affected by this issue is some unknown functionality of the file classes/class-icons-for-features-admin.php. The manipulation of the argument redirect_url leads to open redirect. The attack may be launched remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is 63124c021ae24b68e56872530df26eb4268ad633. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227756.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-2429

Publication date:
30/04/2023
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2025

CVE-2023-2428

Publication date:
30/04/2023
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2025

CVE-2023-2426

Publication date:
29/04/2023
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2023

CVE-2023-30441

Publication date:
29/04/2023
IBM Runtime Environment, Java Technology Edition IBMJCEPlus and JSSE 8.0.7.0 through 8.0.7.11 components could expose sensitive information using a combination of flaws and configurations. IBM X-Force ID: 253188.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2023

CVE-2023-2424

Publication date:
29/04/2023
A vulnerability was found in DedeCMS 5.7.106 and classified as critical. Affected by this issue is the function UpDateMemberModCache of the file uploads/dede/config.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227750 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-2425

Publication date:
29/04/2023
A vulnerability was found in SourceCodester Simple Student Information System 1.0. It has been classified as problematic. This affects an unknown part of the file /classes/Master.php?f=save_course of the component Add New Course. The manipulation of the argument name with the input alert(document.cookie) leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227751.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024