Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-41138

Publication date:
09/11/2023
The AppsAnywhere macOS client-privileged helper can be tricked into executing arbitrary commands with elevated permissions by a local user process.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2023-43791

Publication date:
09/11/2023
Label Studio is a multi-type data labeling and annotation tool with standardized output format. There is a vulnerability that can be chained within the ORM Leak vulnerability to impersonate any account on Label Studio. An attacker could exploit these vulnerabilities to escalate their privileges from a low privilege user to a Django Super Administrator user. The vulnerability was found to affect versions before `1.8.2`, where a patch was introduced.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2023

CVE-2023-47368

Publication date:
09/11/2023
The leakage of channel access token in taketorinoyu Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47370

Publication date:
09/11/2023
The leakage of channel access token in bluetrick Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-40054

Publication date:
09/11/2023
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2023

CVE-2023-47365

Publication date:
09/11/2023
The leakage of channel access token in Lil.OFF-PRICE STORE Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023

CVE-2023-47366

Publication date:
09/11/2023
The leakage of channel access token in craft_members Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47367

Publication date:
09/11/2023
The leakage of channel access token in platinum clinic Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47369

Publication date:
09/11/2023
The leakage of channel access token in best_training_member Line 13.6.1 allows remote attackers to send malicious notifications.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-4612

Publication date:
09/11/2023
Improper Authentication vulnerability in Apereo CAS in jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2023-47363

Publication date:
09/11/2023
The leakage of channel access token in F.B.P members Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-47364

Publication date:
09/11/2023
The leakage of channel access token in nagaoka taxi Line 13.6.1 allows remote attackers to send malicious notifications to victims
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024