Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-31171

Publication date:
31/08/2023
<br /> An Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31170

Publication date:
31/08/2023
<br /> An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31169

Publication date:
31/08/2023
<br /> An Improper Handling of Unicode Encoding vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31173

Publication date:
31/08/2023
Use of Hard-coded Credentials vulnerability in Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator on Windows allows Authentication Bypass.<br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-31168

Publication date:
31/08/2023
<br /> An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> <br /> <br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31167

Publication date:
31/08/2023
Improper Limitation of a Pathname to a Restricted Directory (&amp;#39;Path Traversal&amp;#39;) vulnerability in Schweitzer Engineering Laboratories SEL-5036 acSELerator Bay Screen Builder Software on Windows allows Relative Path Traversal.<br /> <br /> <br /> <br /> SEL acSELerator Bay Screen Builder software is distributed by SEL-5033 SEL acSELerator RTAC, SEL-5030 Quickset, and SEL Compass. CVE-2023-31167 and was patched in the acSELerator Bay Screen Builder release available on 20230602. Please contact SEL for additional details.<br /> <br /> <br /> This issue affects SEL-5036 acSELerator Bay Screen Builder Software: before 1.0.49152.778.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2022-45451

Publication date:
31/08/2023
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-41742

Publication date:
31/08/2023
Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2022-46868

Publication date:
31/08/2023
Local privilege escalation during recovery due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2023-41642

Publication date:
31/08/2023
Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user&amp;#39;s browser via a crafted payload injected into the VIEWSTATE parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-41635

Publication date:
31/08/2023
A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2023

CVE-2023-41640

Publication date:
31/08/2023
An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2023