Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-26010

Publication date:
04/05/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPMobile.App plugin
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2025

CVE-2023-24958

Publication date:
04/05/2023
A vulnerability in the IBM TS7700 Management Interface 8.51.2.12, 8.52.200.111, 8.52.102.13, and 8.53.0.63 could allow an authenticated user to submit a specially crafted URL leading to privilege escalation and remote code execution. IBM X-Force ID: 246320.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-23470

Publication date:
04/05/2023
IBM i 7.2, 7.3, 7.4, and 7.5 could allow an authenticated privileged administrator to gain elevated privileges in non-default configurations, as a result of improper SQL processing. By using a specially crafted SQL operation, the administrator could exploit the vulnerability to perform additional administrator operations. IBM X-Force ID: 244510.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-26016

Publication date:
04/05/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tauhidul Alam Simple Portfolio Gallery plugin
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2023

CVE-2023-25962

Publication date:
04/05/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Biplob Adhikari Accordion – Multiple Accordion or FAQs Builder plugin
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2023

CVE-2022-45818

Publication date:
04/05/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP OnlineSupport, Essential Plugin Hero Banner Ultimate plugin
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2023

CVE-2022-4259

Publication date:
04/05/2023
Due to improper input validation in the Alerts controller, a SQL injection vulnerability in Nozomi Networks Guardian and CMC allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2024

CVE-2017-20184

Publication date:
04/05/2023
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Carlo Gavazzi Powersoft up to version 2.1.1.1 allows an unauthenticated, remote attacker to download any file from the affected device.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2023-22651

Publication date:
04/05/2023
Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher&amp;#39;s admission Webhook may lead to<br /> the misconfiguration of the Webhook. This component enforces validation<br /> rules and security checks before resources are admitted into the <br /> Kubernetes cluster.<br /> The issue only affects users that upgrade from 2.6.x or 2.7.x to 2.7.2. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-25934

Publication date:
04/05/2023
<br /> DELL ECS prior to 3.8.0.2 contains an improper verification of cryptographic signature vulnerability. A network attacker with an ability to intercept the request could potentially exploit this vulnerability to modify the body data of the request.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-26125

Publication date:
04/05/2023
Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.<br /> <br /> **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-30331

Publication date:
04/05/2023
An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025