Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-5713

Publication date:
07/12/2023
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_option_value() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve potentially sensitive option values, and deserialize the content of those values.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-5714

Publication date:
07/12/2023
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_db_specs() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve data key specs.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-5711

Publication date:
07/12/2023
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_php_info() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve sensitive information provided by PHP info.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-5710

Publication date:
07/12/2023
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_constants() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve sensitive information such as database credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-5712

Publication date:
07/12/2023
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_global_value() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve sensitive global value information.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2023-46218

Publication date:
07/12/2023
This flaw allows a malicious HTTP server to set "super cookies" in curl that<br /> are then passed back to more origins than what is otherwise allowed or<br /> possible. This allows a site to set cookies that then would get sent to<br /> different and unrelated sites and domains.<br /> <br /> It could do this by exploiting a mixed case flaw in curl&amp;#39;s function that<br /> verifies a given cookie domain against the Public Suffix List (PSL). For<br /> example a cookie could be set with `domain=co.UK` when the URL used a lower<br /> case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2023-6566

Publication date:
07/12/2023
Business Logic Errors in GitHub repository microweber/microweber prior to 2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2023

CVE-2023-46353

Publication date:
06/12/2023
In the module "Product Tag Icons Pro" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2023

CVE-2023-46354

Publication date:
06/12/2023
In the module "Orders (CSV, Excel) Export PRO" (ordersexport)
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2023

CVE-2023-46751

Publication date:
06/12/2023
An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2023

CVE-2023-48123

Publication date:
06/12/2023
An issue in Netgate pfSense Plus v.23.05.1 and before and pfSense CE v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the packet_capture.php file.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2023

CVE-2023-49096

Publication date:
06/12/2023
Jellyfin is a Free Software Media System for managing and streaming media. In affected versions there is an argument injection in the VideosController, specifically the `/Videos//stream` and `/Videos//stream.` endpoints which are present in the current Jellyfin version. Additional endpoints in the AudioController might also be vulnerable, as they differ only slightly in execution. Those endpoints are reachable by an unauthenticated user. In order to exploit this vulnerability an unauthenticated attacker has to guess an itemId, which is a completely random GUID. It’s a very unlikely case even for a large media database with lots of items. Without an additional information leak, this vulnerability shouldn’t be directly exploitable, even if the instance is reachable from the Internet. There are a lot of query parameters that get accepted by the method. At least two of those, videoCodec and audioCodec are vulnerable to the argument injection. The values can be traced through a lot of code and might be changed in the process. However, the fallback is to always use them as-is, which means we can inject our own arguments. Those arguments land in the command line of FFmpeg. Because UseShellExecute is always set to false, we can’t simply terminate the FFmpeg command and execute our own. It should only be possible to add additional arguments to FFmpeg, which is powerful enough as it stands. There is probably a way of overwriting an arbitrary file with malicious content. This vulnerability has been addressed in version 10.8.13. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2023