Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-3492

Publication date:
07/08/2023
The WP Shopping Pages WordPress plugin through 1.14 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-3365

Publication date:
07/08/2023
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.14 does not have authorisation when deleting shipment, allowing any authenticated users, such as subscriber to delete arbitrary shipment
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2023-2843

Publication date:
07/08/2023
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.15 does not properly sanitize and escape a parameter before using it in an SQL statement, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2023-0604

Publication date:
07/08/2023
The WP Food Manager WordPress plugin before 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2021-24916

Publication date:
07/08/2023
The Qubely WordPress plugin before 1.8.6 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses via the qubely_send_form_data AJAX action.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-27373

Publication date:
07/08/2023
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. Due to insufficient input validation, an attacker can tamper with a runtime-accessible EFI variable to cause a dynamic BAR setting to overlap SMRAM.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2025

CVE-2023-4194

Publication date:
07/08/2023
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2024

CVE-2023-4147

Publication date:
07/08/2023
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2023-4205

Publication date:
07/08/2023
Rejected reason: This was deemed as a false positive both by the reporter and upstream kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-36220

Publication date:
07/08/2023
Directory Traversal vulnerability in Textpattern CMS v4.8.8 allows a remote authenticated attacker to execute arbitrary code and gain access to sensitive information via the plugin Upload function.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2023

CVE-2022-38795

Publication date:
07/08/2023
In Gitea through 1.17.1, repo cloning can occur in the migration function.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2023

CVE-2023-3896

Publication date:
07/08/2023
Divide By Zero in vim/vim from 9.0.1367-1 to 9.0.1367-3
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025