Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-41746

Publication date:
31/08/2023
Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-41747

Publication date:
31/08/2023
Sensitive information disclosure due to unauthenticated path traversal. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2023-41748

Publication date:
31/08/2023
Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-41717

Publication date:
31/08/2023
Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2023-41743

Publication date:
31/08/2023
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Cyber Protect Cloud Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979, Acronis True Image OEM (Windows) before build 42575.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2023-34391

Publication date:
31/08/2023
Insecure Inherited Permissions vulnerability in Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software on Windows allows Leveraging/Manipulating Configuration File Search Paths.<br /> <br /> See Instruction Manual Appendix A [Cybersecurity] tag dated 20230522 for more details.<br /> <br /> This issue affects SEL-5033 AcSELerator RTAC Software: before 1.35.151.21000.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-34392

Publication date:
31/08/2023
<br /> A Missing Authentication for Critical Function vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run arbitrary commands on managed devices by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-41744

Publication date:
31/08/2023
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-4678

Publication date:
31/08/2023
Divide By Zero in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-4681

Publication date:
31/08/2023
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-4682

Publication date:
31/08/2023
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-4683

Publication date:
31/08/2023
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024