Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-31748

Publication date:
24/05/2023
Insecure permissions in MobileTrans v4.0.11 allows attackers to escalate privileges to local admin via replacing the executable file.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2023-33246

Publication date:
24/05/2023
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. <br /> <br /> Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. <br /> <br /> To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2023-33942

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in the Web Content Display widget&amp;#39;s article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article&amp;#39;s `Title` field.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2023-33941

Publication date:
24/05/2023
Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module&amp;#39;s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2023-33943

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user&amp;#39;s (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2026

CVE-2023-2045

Publication date:
24/05/2023
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Ipekyolu Software Auto Damage Tracking Software allows SQL Injection.This issue affects Auto Damage Tracking Software: before 4.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2023-2064

Publication date:
24/05/2023
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Minova Technology eTrace allows SQL Injection.This issue affects eTrace: before 23.05.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2023-33938

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in the App Builder module&amp;#39;s custom object details page in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before update 14 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an App Builder custom object&amp;#39;s `Name` field.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2023-33939

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in the Modified Facet widget in Liferay Portal 7.1.0 through 7.4.3.12, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 18, 7.3 before update 4, and 7.4 before update 9 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a facet label.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2026

CVE-2023-33940

Publication date:
24/05/2023
Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App&amp;#39;s IFrame URL.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2026

CVE-2023-33010

Publication date:
24/05/2023
A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2023-33009

Publication date:
24/05/2023
A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025