Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-0604

Publication date:
07/08/2023
The WP Food Manager WordPress plugin before 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2021-24916

Publication date:
07/08/2023
The Qubely WordPress plugin before 1.8.6 allows unauthenticated user to send arbitrary e-mails to arbitrary addresses via the qubely_send_form_data AJAX action.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-27373

Publication date:
07/08/2023
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. Due to insufficient input validation, an attacker can tamper with a runtime-accessible EFI variable to cause a dynamic BAR setting to overlap SMRAM.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2025

CVE-2023-4194

Publication date:
07/08/2023
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2024

CVE-2023-4147

Publication date:
07/08/2023
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2023-4205

Publication date:
07/08/2023
Rejected reason: This was deemed as a false positive both by the reporter and upstream kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-36220

Publication date:
07/08/2023
Directory Traversal vulnerability in Textpattern CMS v4.8.8 allows a remote authenticated attacker to execute arbitrary code and gain access to sensitive information via the plugin Upload function.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2023

CVE-2022-38795

Publication date:
07/08/2023
In Gitea through 1.17.1, repo cloning can occur in the migration function.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2023

CVE-2023-3896

Publication date:
07/08/2023
Divide By Zero in vim/vim from 9.0.1367-1 to 9.0.1367-3
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-38392

Publication date:
07/08/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Hiroaki Miyashita Custom Field Template plugin
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2023

CVE-2023-32090

Publication date:
07/08/2023
Pega platform clients who are using versions 6.1 through 7.3.1 may be<br /> utilizing default credentials<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
10/08/2023

CVE-2023-0426

Publication date:
07/08/2023
<br /> ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves<br /> the reported vulnerabilities in the product versions under maintenance.<br /> An attacker who successfully exploited one or more of these vulnerabilities could cause the product to<br /> stop or make the product inaccessible. <br /> <br /> <br /> <br /> Stack-based Buffer Overflow vulnerability in ABB Freelance controllers AC 700F (conroller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects:<br /> <br />  Freelance controllers AC 700F: <br /> <br /> from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019 , through Freelance 2019 SP1, through Freelance 2019 SP1 FP1; <br /> <br /> <br /> <br /> <br /> Freelance controllers AC 900F: <br /> <br /> through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2023