Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-26911

Publication date:
26/07/2023
ASUS SetupAsusServices v1.0.5.1 in Asus Armoury Crate v5.3.4.0 contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2023-26859

Publication date:
26/07/2023
SQL injection vulnerability found in PrestaShop sendinblue v.4.0.15 and before allow a remote attacker to gain privileges via the ajaxOrderTracking.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2023

CVE-2023-39151

Publication date:
26/07/2023
Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control build log contents.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2023

CVE-2023-39152

Publication date:
26/07/2023
Always-incorrect control flow implementation in Jenkins Gradle Plugin 2.8 may result in credentials not being masked (i.e., replaced with asterisks) in the build log in some circumstances.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2023-39154

Publication date:
26/07/2023
Incorrect permission checks in Jenkins Qualys Web App Scanning Connector Plugin 2.0.10 and earlier allow attackers with global Item/Configure permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2023-39153

Publication date:
26/07/2023
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Authentication Plugin 1.17.1 and earlier allows attackers to trick users into logging in to the attacker's account.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023

CVE-2022-43711

Publication date:
26/07/2023
Interactive Forms (IAF) in GX Software XperienCentral versions 10.29.1 until 10.33.0 was vulnerable to cross site scripting attacks (XSS) because the CSP header uses eval() in the script-src.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2022-43713

Publication date:
26/07/2023
Interactive Forms (IAF) in GX Software XperienCentral versions 10.33.1 until 10.35.0 was vulnerable to invalid data input because form validation could be bypassed.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2024

CVE-2022-43710

Publication date:
26/07/2023
Interactive Forms (IAF) in GX Software XperienCentral versions 10.31.0 until 10.33.0 was vulnerable to cross site request forgery (CSRF) because the unique token could be deduced using the names of all input fields.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2022-43712

Publication date:
26/07/2023
POST requests to /web/mvc in GX Software XperienCentral version 10.36.0 and earlier were not blocked for uses that are not logged in. If an unauthorized user is able to bypass other security filters they are able to post unauthorized data to the server because of CVE-2022-22965.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2023

CVE-2023-39261

Publication date:
26/07/2023
In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2023

CVE-2023-37049

Publication date:
26/07/2023
emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\template.php.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2023