Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4681

Publication date:
31/08/2023
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-4682

Publication date:
31/08/2023
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-4683

Publication date:
31/08/2023
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31169

Publication date:
31/08/2023
<br /> An Improper Handling of Unicode Encoding vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31170

Publication date:
31/08/2023
<br /> An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31171

Publication date:
31/08/2023
<br /> An Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31172

Publication date:
31/08/2023
<br /> An Incomplete Filtering of Special Elements vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31173

Publication date:
31/08/2023
Use of Hard-coded Credentials vulnerability in Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator on Windows allows Authentication Bypass.<br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31174

Publication date:
31/08/2023
<br /> A Cross-Site Request Forgery (CSRF) vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31175

Publication date:
31/08/2023
<br /> An Execution with Unnecessary Privileges vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run system commands with the highest level privilege on the system.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31167

Publication date:
31/08/2023
Improper Limitation of a Pathname to a Restricted Directory (&amp;#39;Path Traversal&amp;#39;) vulnerability in Schweitzer Engineering Laboratories SEL-5036 acSELerator Bay Screen Builder Software on Windows allows Relative Path Traversal.<br /> <br /> <br /> <br /> SEL acSELerator Bay Screen Builder software is distributed by SEL-5033 SEL acSELerator RTAC, SEL-5030 Quickset, and SEL Compass. CVE-2023-31167 and was patched in the acSELerator Bay Screen Builder release available on 20230602. Please contact SEL for additional details.<br /> <br /> <br /> This issue affects SEL-5036 acSELerator Bay Screen Builder Software: before 1.0.49152.778.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-31168

Publication date:
31/08/2023
<br /> An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> <br /> <br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024