Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-44216

Publication date:
27/09/2023
PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification, aka a GPU.zip issue. For example, attackers can sometimes accurately determine text contained on a web page from one origin if they control a resource from a different origin.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2023

CVE-2023-4065

Publication date:
27/09/2023
A flaw was found in Red Hat AMQ Broker Operator, where it displayed a password defined in ActiveMQArtemisAddress CR, shown in plain text in the Operator Log. This flaw allows an authenticated local attacker to access information outside of their permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2023-44159

Publication date:
27/09/2023
Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2023-44160

Publication date:
27/09/2023
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2023-44161

Publication date:
27/09/2023
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2023-44169

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_notify.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44170

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ping.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44171

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_smtp.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44172

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_weixin.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44129

Publication date:
27/09/2023
The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2023

CVE-2023-44152

Publication date:
27/09/2023
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2023-44153

Publication date:
27/09/2023
Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023