Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-43501

Publication date:
20/09/2023
A missing permission check in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-43502

Publication date:
20/09/2023
A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to delete Failure Causes.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-40043

Publication date:
20/09/2023
<br /> In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer web interface that could allow a MOVEit system administrator account to gain unauthorized access to the MOVEit Transfer database. A MOVEit system administrator<br /> <br /> could submit a crafted payload to the MOVEit Transfer web interface which could result in modification and disclosure of MOVEit database content.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-42656

Publication date:
20/09/2023
<br /> In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a reflected cross-site scripting (XSS) vulnerability has been identified in MOVEit Transfer&amp;#39;s web interface.  An attacker could craft a malicious payload targeting MOVEit Transfer users during the package composition procedure.  If a MOVEit user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-42660

Publication date:
20/09/2023
<br /> In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer machine interface that could allow an authenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to the MOVEit Transfer machine interface which could result in modification and disclosure of MOVEit database content.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-43494

Publication date:
20/09/2023
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2023

CVE-2023-43495

Publication date:
20/09/2023
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the &amp;#39;caption&amp;#39; constructor parameter of &amp;#39;ExpandableDetailsNote&amp;#39;, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2023

CVE-2023-43496

Publication date:
20/09/2023
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-43497

Publication date:
20/09/2023
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2023

CVE-2023-43498

Publication date:
20/09/2023
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-43499

Publication date:
20/09/2023
Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not escape Failure Cause names in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or update Failure Causes.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023

CVE-2023-2262

Publication date:
20/09/2023
<br /> <br /> <br /> A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2023