Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-46816

Publication date:
24/05/2023
Cross-Site Request Forgery (CSRF) vulnerability in Booking Ultra Pro Appointments Booking Calendar Plugin plugin
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2022-47152

Publication date:
24/05/2023
Cross-Site Request Forgery (CSRF) vulnerability in Etison, LLC ClickFunnels plugin
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2022-47180

Publication date:
24/05/2023
Cross-Site Request Forgery (CSRF) vulnerability in Kopa Theme Kopa Framework plugin
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2023-33945

Publication date:
24/05/2023
SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table's primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2023-33946

Publication date:
24/05/2023
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2023-33947

Publication date:
24/05/2023
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2023-33944

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment's `URL` text field.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2026

CVE-2023-31748

Publication date:
24/05/2023
Insecure permissions in MobileTrans v4.0.11 allows attackers to escalate privileges to local admin via replacing the executable file.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2023-33246

Publication date:
24/05/2023
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. <br /> <br /> Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. <br /> <br /> To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2023-33942

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in the Web Content Display widget&amp;#39;s article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article&amp;#39;s `Title` field.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2023-33941

Publication date:
24/05/2023
Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module&amp;#39;s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2023-33943

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user&amp;#39;s (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2026