Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-28774

Publication date:
22/06/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Grade Us, Inc. Review Stream plugin
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2023-25500

Publication date:
22/06/2023
Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2023-25499

Publication date:
22/06/2023
When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential information disclosure.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2023-35093

Publication date:
22/06/2023
Broken Access Control vulnerability in StylemixThemes MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2023-34939

Publication date:
22/06/2023
Onlyoffice Community Server before v12.5.2 was discovered to contain a remote code execution (RCE) vulnerability via the component UploadProgress.ashx.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2023-35917

Publication date:
22/06/2023
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce PayPal Payments plugin
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2023-35918

Publication date:
22/06/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WooCommerce Bulk Stock Management plugin
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2023-31867

Publication date:
22/06/2023
Sage X3 version 12.14.0.50-0 is vulnerable to CSV Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2023-29711

Publication date:
22/06/2023
An incorrect access control issue was discovered in Interlink PSG-5124 version 1.0.4, allows attackers to execute arbitrary code via crafted GET request.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-31868

Publication date:
22/06/2023
Sage X3 version 12.14.0.50-0 is vulnerable to Cross Site Scripting (XSS). Some parts of the Web application are dynamically built using user&amp;#39;s inputs. Yet, those inputs are not verified nor filtered by the application, so they mathed the expected format. Therefore, when HTML/JavaScript code is injected into those fields, this code will be saved by the application and executed by the web browser of the user viewing the web page. Several injection points have been identified on the application. The major one requires the user to be authenticated with a common account, he can then target an Administrator. All others endpoints need the malicious user to be authenticated as an Administrator. Therefore, the impact is diminished.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2023-30500

Publication date:
22/06/2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPForms WPForms Lite (wpforms-lite), WPForms WPForms Pro (wpforms) plugins
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2023-23807

Publication date:
22/06/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Qumos MojoPlug Slide Panel plugin
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023