Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4900

Publication date:
12/09/2023
Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate a permission prompt via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4901

Publication date:
12/09/2023
Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4902

Publication date:
12/09/2023
Inappropriate implementation in Input in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4903

Publication date:
12/09/2023
Inappropriate implementation in Custom Mobile Tabs in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4904

Publication date:
12/09/2023
Insufficient policy enforcement in Downloads in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Enterprise policy restrictions via a crafted download. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4905

Publication date:
12/09/2023
Inappropriate implementation in Prompts in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4906

Publication date:
12/09/2023
Insufficient policy enforcement in Autofill in Google Chrome prior to 117.0.5938.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4907

Publication date:
12/09/2023
Inappropriate implementation in Intents in Google Chrome on Android prior to 117.0.5938.62 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-4918

Publication date:
12/09/2023
A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-4921

Publication date:
12/09/2023
A use-after-free vulnerability in the Linux kernel&amp;#39;s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.<br /> <br /> When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().<br /> <br /> We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-39215

Publication date:
12/09/2023
Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024

CVE-2023-39208

Publication date:
12/09/2023
Improper input validation in Zoom Desktop Client for Linux before version 5.15.10 may allow an unauthenticated user to conduct a denial of service via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024