Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-44161

Publication date:
27/09/2023
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2023-44169

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_notify.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44170

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ping.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44171

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_smtp.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44172

Publication date:
27/09/2023
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_weixin.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2023-44129

Publication date:
27/09/2023
The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2023

CVE-2023-44152

Publication date:
27/09/2023
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2023-44153

Publication date:
27/09/2023
Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2023-44154

Publication date:
27/09/2023
Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
26/10/2023

CVE-2023-44155

Publication date:
27/09/2023
Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023

CVE-2023-44156

Publication date:
27/09/2023
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2023-44158

Publication date:
27/09/2023
Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2023