Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-1913

Publication date:
06/04/2023
The Maps Widget for Google Maps for WordPress is vulnerable to Stored Cross-Site Scripting via widget settings in versions up to, and including, 4.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-25062

Publication date:
06/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PINPOINT.WORLD Pinpoint Booking System plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24396

Publication date:
06/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24378

Publication date:
06/04/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Codeat Glossary plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24374

Publication date:
06/04/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Photon WP Material Design Icons for Page Builders plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-23891

Publication date:
06/04/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-0750

Publication date:
06/04/2023
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface.  When the device can be accessed over the network an attacker could bypass authentication.<br /> <br /> <br /> <br /> <br /> This would allow an attacker to : <br /> - Change the password, resulting in a DOS of the users<br /> <br /> - Change the streaming source, compromising the integrity of the stream<br /> <br /> - Change the streaming destination, compromising the confidentiality of the stream<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-1908

Publication date:
06/04/2023
A vulnerability was found in SourceCodester Simple Mobile Comparison Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/categories/view_category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225150 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2022-46793

Publication date:
06/04/2023
Cross-Site Request Forgery (CSRF) vulnerability in AdTribes.Io Product Feed PRO for WooCommerce plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-23801

Publication date:
06/04/2023
Cross-Site Request Forgery (CSRF) vulnerability in HasThemes Really Simple Google Tag Manager plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24411

Publication date:
06/04/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kerry Kline BNE Testimonials plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-24387

Publication date:
06/04/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPdevart Organization chart plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023