Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-45853

Publication date:
30/05/2023
The privilege escalation vulnerability in the Zyxel GS1900-8 firmware version <br /> <br /> V2.70(AAHH.3) and the GS1900-8HP firmware version V2.70(AAHI.3) could allow an authenticated, local attacker with administrator privileges to execute some system commands as &amp;#39;root&amp;#39; on a vulnerable device via SSH.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-30601

Publication date:
30/05/2023
Privilege escalation when enabling FQL/Audit logs allows user with JMX access to run arbitrary commands as the user running Apache Cassandra<br /> This issue affects Apache Cassandra: from 4.0.0 through 4.0.9, from 4.1.0 through 4.1.1.<br /> <br /> WORKAROUND<br /> The vulnerability requires nodetool/JMX access to be exploitable, disable access for any non-trusted users.<br /> <br /> MITIGATION<br /> Upgrade to 4.0.10 or 4.1.2 and leave the new FQL/Auditlog configuration property allow_nodetool_archive_command as false.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2023

CVE-2023-2287

Publication date:
30/05/2023
The Orbit Fox by ThemeIsle WordPress plugin before 2.10.24 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-2288

Publication date:
30/05/2023
The Otter WordPress plugin before 2.2.6 does not sanitize some user-controlled file paths before performing file operations on them. This leads to a PHAR deserialization vulnerability on PHP
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-2518

Publication date:
30/05/2023
The Easy Forms for Mailchimp WordPress plugin before 6.8.9 does not sanitise and escape a parameter before outputting it back in the page when the debug option is enabled, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-2223

Publication date:
30/05/2023
The Login rebuilder WordPress plugin before 2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-2256

Publication date:
30/05/2023
The Product Addons &amp; Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-2296

Publication date:
30/05/2023
The Loginizer WordPress plugin before 1.7.9 does not escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-2470

Publication date:
30/05/2023
The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-2023

Publication date:
30/05/2023
The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2022-4676

Publication date:
30/05/2023
The OSM WordPress plugin through 6.01 does not validate and escape some of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-0443

Publication date:
30/05/2023
The AnyWhere Elementor WordPress plugin before 1.2.8 discloses a Freemius Secret Key which could be used by an attacker to purchase the pro subscription using test credit card numbers without actually paying the amount. Such key has been revoked.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025