Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4949

Publication date:
10/11/2023
An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-6076

Publication date:
10/11/2023
A vulnerability classified as problematic was found in PHPGurukul Restaurant Table Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file booking-details.php of the component Reservation Status Handler. The manipulation of the argument bid leads to information disclosure. The attack can be launched remotely. The identifier VDB-244945 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-47120

Publication date:
10/11/2023
Discourse is an open source platform for community discussion. In versions 3.1.0 through 3.1.2 of the `stable` branch and versions 3.1.0,beta6 through 3.2.0.beta2 of the `beta` and `tests-passed` branches, Redis memory can be depleted by crafting a site with an abnormally long favicon URL and drafting multiple posts which Onebox it. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2023

CVE-2023-47121

Publication date:
10/11/2023
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, the embedding feature is susceptible to server side request forgery. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. As a workaround, disable the Embedding feature.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2023

CVE-2023-47614

Publication date:
10/11/2023
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to disclose hidden virtual paths and file names on the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-39295

Publication date:
10/11/2023
An OS command injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following version:<br /> QuMagie 2.1.3 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-41284

Publication date:
10/11/2023
A SQL injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.<br /> <br /> We have already fixed the vulnerability in the following version:<br /> QuMagie 2.1.4 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-41285

Publication date:
10/11/2023
A SQL injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.<br /> <br /> We have already fixed the vulnerability in the following version:<br /> QuMagie 2.1.4 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-6074

Publication date:
10/11/2023
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file check-status.php of the component Booking Reservation Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-244943.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-6075

Publication date:
10/11/2023
A vulnerability classified as problematic has been found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file index.php of the component Reservation Request Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-244944.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-47119

Publication date:
10/11/2023
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, some links can inject arbitrary HTML tags when rendered through our Onebox engine. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-23367

Publication date:
10/11/2023
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following versions:<br /> QTS 5.0.1.2376 build 20230421 and later<br /> QuTS hero h5.0.1.2376 build 20230421 and later<br /> QuTScloud c5.1.0.2498 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2023