Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-51726

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the SMTP Server Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51727

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the SMTP Username parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51724

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the URL parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51725

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Contact Email Address parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51723

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Description parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51721

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 2 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51722

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 3 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51720

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 1 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2023-51719

Publication date:
17/01/2024
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Traceroute parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2024

CVE-2024-0405

Publication date:
17/01/2024
The Burst Statistics – Privacy-Friendly Analytics for WordPress plugin, version 1.5.3, is vulnerable to Post-Authenticated SQL Injection via multiple JSON parameters in the /wp-json/burst/v1/data/compare endpoint. Affected parameters include &amp;#39;browser&amp;#39;, &amp;#39;device&amp;#39;, &amp;#39;page_id&amp;#39;, &amp;#39;page_url&amp;#39;, &amp;#39;platform&amp;#39;, and &amp;#39;referrer&amp;#39;. This vulnerability arises due to insufficient escaping of user-supplied parameters and the lack of adequate preparation in SQL queries. As a result, authenticated attackers with editor access or higher can append additional SQL queries into existing ones, potentially leading to unauthorized access to sensitive information from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2025

CVE-2023-52069

Publication date:
17/01/2024
kodbox v1.49.04 was discovered to contain a cross-site scripting (XSS) vulnerability via the URL parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2025

CVE-2023-25295

Publication date:
17/01/2024
A Cross Site Scripting (XSS) vulnerability in evewa3ajax.php in GRUEN eVEWA3 Community 31 through 53 allows attackers to obtain escalated privileges via a crafted request to the login panel.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025