Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-29626

Publication date:
14/04/2023
Yoga Class Registration System 1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at /admin/login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-29625

Publication date:
14/04/2023
Employee Performance Evaluation System v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2025

CVE-2023-29623

Publication date:
14/04/2023
Purchase Order Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the password parameter at /purchase_order/classes/login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-29622

Publication date:
14/04/2023
Purchase Order Management v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /purchase_order/admin/login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-29621

Publication date:
14/04/2023
Purchase Order Management v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-26969

Publication date:
14/04/2023
Atropim 1.5.26 is vulnerable to Directory Traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-2034

Publication date:
14/04/2023
Unrestricted Upload of File with Dangerous Type in GitHub repository froxlor/froxlor prior to 2.0.14.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2023

CVE-2023-29132

Publication date:
14/04/2023
Irssi 1.3.x and 1.4.x before 1.4.4 has a use-after-free because of use of a stale special collector reference. This occurs when printing of a non-formatted line is concurrent with printing of a formatted line.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-29491

Publication date:
14/04/2023
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-27890

Publication date:
14/04/2023
The Export User plugin through 2.0 for MyBB allows XSS during the process of an admin generating DSGVO data for a user, via the Custom User Title, Location, or Bio field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-30638

Publication date:
14/04/2023
Atos Unify OpenScape SBC 10 before 10R3.1.3, OpenScape Branch 10 before 10R3.1.2, and OpenScape BCF 10 before 10R10.7.0 allow remote authenticated admins to inject commands.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-26918

Publication date:
14/04/2023
Diasoft File Replication Pro 7.5.0 allows attackers to escalate privileges by replacing a legitimate file with a Trojan horse that will be executed as LocalSystem. This occurs because %ProgramFiles%\FileReplicationPro allows Everyone:(F) access.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025