Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-43343

Publication date:
05/10/2023
Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Files - Description parameter in the Pages Menu component.
Severity CVSS v4.0: Pending analysis
Last modification:
12/09/2024

CVE-2023-44211

Publication date:
05/10/2023
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 31637, Acronis Cyber Protect 16 (Linux, Windows) before build 37391.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2023-44212

Publication date:
05/10/2023
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31477.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2023

CVE-2023-44213

Publication date:
05/10/2023
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 35739, Acronis Cyber Protect 16 (Windows) before build 37391.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2023-44214

Publication date:
05/10/2023
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2023

CVE-2023-45240

Publication date:
05/10/2023
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2023

CVE-2023-45241

Publication date:
05/10/2023
Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35739, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 37391.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2023-45242

Publication date:
05/10/2023
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2023

CVE-2023-45243

Publication date:
05/10/2023
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2023

CVE-2023-39323

Publication date:
05/10/2023
Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2023-5441

Publication date:
05/10/2023
NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2023-40920

Publication date:
05/10/2023
Prixan prixanconnect up to v1.62 was discovered to contain a SQL injection vulnerability via the component CartsGuruCatalogModuleFrontController::importProducts().
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024