Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4834

Publication date:
16/10/2023
In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2023

CVE-2023-5421

Publication date:
16/10/2023
An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs <br /> immediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.<br /> This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2023

CVE-2023-45638

Publication date:
16/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in euPago Eupago Gateway For Woocommerce plugin
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-45650

Publication date:
16/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-45651

Publication date:
16/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi WP Attachments allows Cross Site Request Forgery.This issue affects WP Attachments: from n/a through 5.0.11.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2024

CVE-2023-45653

Publication date:
16/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in Galaxy Weblinks Video Playlist For YouTube plugin
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2023

CVE-2023-45654

Publication date:
16/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in Pixelgrade Comments Ratings plugin
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2023

CVE-2023-45655

Publication date:
16/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in PixelGrade PixFields plugin
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2023

CVE-2023-38059

Publication date:
16/10/2023
The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2023

CVE-2023-3392

Publication date:
16/10/2023
The Read More &amp; Accordion WordPress plugin before 3.2.7 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-43666

Publication date:
16/10/2023
Insufficient Verification of Data Authenticity vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0, <br /> <br /> General user can view all user data like Admin account.<br /> <br /> Users are advised to upgrade to Apache InLong&amp;#39;s 1.9.0 or cherry-pick [1] to solve it.<br /> <br /> [1]  https://github.com/apache/inlong/pull/8623 <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-43667

Publication date:
16/10/2023
Improper Neutralization of Special Elements in Output Used by a Downstream Component (&amp;#39;Injection&amp;#39;) vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0, the attacker can create misleading or false log records, making it harder to audit<br /> and trace malicious activities. Users are advised to upgrade to Apache InLong&amp;#39;s 1.9.0 or cherry-pick [1] to solve it.<br /> <br /> [1] https://github.com/apache/inlong/pull/8628
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025