Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-46582

Publication date:
14/11/2023
SQL injection vulnerability in Inventory Management v.1.0 allows a local attacker to execute arbitrary SQL commands via the id paramter in the deleteProduct.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47520

Publication date:
14/11/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Uno (miunosoft) Responsive Column Widgets plugin
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47522

Publication date:
14/11/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Feed plugin
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47524

Publication date:
14/11/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability (requires PHP 8.x) in CodeBard CodeBard's Patron Button and Widgets for Patreon plugin
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-36558

Publication date:
14/11/2023
ASP.NET Core Security Feature Bypass Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2025

CVE-2023-39535

Publication date:
14/11/2023
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023

CVE-2023-39536

Publication date:
14/11/2023
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023

CVE-2023-39537

Publication date:
14/11/2023
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023

CVE-2022-45781

Publication date:
14/11/2023
Buffer Overflow vulnerability in Tenda AX1803 v1.0.0.1_2994 and earlier allows attackers to run arbitrary code via /goform/SetOnlineDevName.
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2024

CVE-2023-36038

Publication date:
14/11/2023
ASP.NET Core Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-5528

Publication date:
14/11/2023
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
Severity CVSS v4.0: Pending analysis
Last modification:
03/01/2025

CVE-2023-47630

Publication date:
14/11/2023
Kyverno is a policy engine designed for Kubernetes. An issue was found in Kyverno that allowed an attacker to control the digest of images used by Kyverno users. The issue would require the attacker to compromise the registry that the Kyverno users fetch their images from. The attacker could then return an vulnerable image to the the user and leverage that to further escalate their position. As such, the attacker would need to know which images the Kyverno user consumes and know of one of multiple exploitable vulnerabilities in previous digests of the images. Alternatively, if the attacker has compromised the registry, they could craft a malicious image with a different digest with intentionally placed vulnerabilities and deliver the image to the user. Users pulling their images by digests and from trusted registries are not impacted by this vulnerability. There is no evidence of this being exploited in the wild. The issue has been patched in 1.10.5. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2023