Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4892

Publication date:
25/09/2023
Teedy v1.11 has a vulnerability in its text editor that allows events<br /> <br /> to be executed in HTML tags that an attacker could manipulate. Thanks<br /> <br /> to this, it is possible to execute malicious JavaScript in the webapp.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2023

CVE-2023-5156

Publication date:
25/09/2023
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2024

CVE-2023-5158

Publication date:
25/09/2023
A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-5165

Publication date:
25/09/2023
Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. <br /> <br /> This issue has been fixed in Docker Desktop 4.23.0. <br /> <br /> Affected Docker Desktop versions: from 4.13.0 before 4.23.0.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2023

CVE-2023-5166

Publication date:
25/09/2023
Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL.<br /> <br /> This issue affects Docker Desktop: before 4.23.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2023

CVE-2023-3226

Publication date:
25/09/2023
The Popup Builder WordPress plugin before 4.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2023

CVE-2023-3547

Publication date:
25/09/2023
The All in One B2B for WooCommerce WordPress plugin through 1.0.3 does not properly check nonce values in several actions, allowing an attacker to perform CSRF attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2023-3550

Publication date:
25/09/2023
Mediawiki v1.40.0 does not validate namespaces used in XML files.<br /> <br /> Therefore, if the instance administrator allows XML file uploads,<br /> <br /> a remote attacker with a low-privileged user account can use this<br /> <br /> exploit to become an administrator by sending a malicious link to<br /> <br /> the instance administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-3664

Publication date:
25/09/2023
The FileOrganizer WordPress plugin through 1.0.2 does not restrict functionality on multisite instances, allowing site admins to gain full control over the server.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2024

CVE-2023-43141

Publication date:
25/09/2023
TOTOLINK A3700R V9.1.2u.6134_B20201202 and N600R V5.3c.5137 are vulnerable to Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-43339

Publication date:
25/09/2023
Cross-Site Scripting (XSS) vulnerability in cmsmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload injected into the Database Name, DataBase User or Database Port components.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-43382

Publication date:
25/09/2023
Directory Traversal vulnerability in itechyou dreamer CMS v.4.1.3 allows a remote attacker to execute arbitrary code via the themePath in the uploaded template function.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2023