Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-41425

Publication date:
07/11/2023
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2023-42659

Publication date:
07/11/2023
<br /> In WS_FTP Server versions prior to 8.7.6 and 8.8.4, an unrestricted file upload flaw has been identified. An authenticated Ad Hoc Transfer user has the ability to craft an API call which allows them to upload a file to a specified location on the underlying operating system hosting the WS_FTP Server application.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2023

CVE-2022-45357

Publication date:
07/11/2023
Improper Neutralization of Formula Elements in a CSV File vulnerability in Lenderd 1003 Mortgage Application.This issue affects 1003 Mortgage Application: from n/a through 1.75.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2022-47442

Publication date:
07/11/2023
Improper Neutralization of Formula Elements in a CSV File vulnerability in AyeCode Ltd UsersWP.This issue affects UsersWP: from n/a through 1.2.3.9.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2023-33478

Publication date:
07/11/2023
RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2023-33479

Publication date:
07/11/2023
RemoteClinic version 2.0 contains a SQL injection vulnerability in the /staff/edit.php file.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2023-33480

Publication date:
07/11/2023
RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2023-33481

Publication date:
07/11/2023
RemoteClinic 2.0 is vulnerable to a time-based blind SQL injection attack in the &amp;#39;start&amp;#39; GET parameter of patients/index.php.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2023-47455

Publication date:
07/11/2023
Tenda AX1806 V1.0.0.1 contains a heap overflow vulnerability in setSchedWifi function, in which the src and v12 are directly obtained from http request parameter schedStartTime and schedEndTime without checking their size.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2024

CVE-2023-47456

Publication date:
07/11/2023
Tenda AX1806 V1.0.0.1 contains a stack overflow vulnerability in function sub_455D4, called by function fromSetWirelessRepeat.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2024

CVE-2022-45350

Publication date:
07/11/2023
Improper Neutralization of Formula Elements in a CSV File vulnerability in Pär Thernström Simple History – user activity log, audit tool.This issue affects Simple History – user activity log, audit tool: from n/a through 3.3.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2023-5659

Publication date:
07/11/2023
The Interact: Embed A Quiz On Your Site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s &amp;#39;interact-quiz&amp;#39; shortcode in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2023