Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-46868

Publication date:
31/08/2023
Local privilege escalation during recovery due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2023-41642

Publication date:
31/08/2023
Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-41635

Publication date:
31/08/2023
A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2023

CVE-2023-41640

Publication date:
31/08/2023
An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2023

CVE-2023-33835

Publication date:
31/08/2023
IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a remote attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 256015.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2023

CVE-2023-33834

Publication date:
31/08/2023
IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a remote attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-force ID: 256014.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2023

CVE-2023-41638

Publication date:
31/08/2023
An arbitrary file upload vulnerability in the Gestione Documentale module of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-41636

Publication date:
31/08/2023
A SQL injection vulnerability in the Data Richiesta dal parameter of GruppoSCAI RealGimm v1.1.37p38 allows attackers to access the database and execute arbitrary commands via a crafted SQL query.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-41637

Publication date:
31/08/2023
An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-28801

Publication date:
31/08/2023
An Improper Verification of Cryptographic Signature in the SAML authentication of the Zscaler Admin UI allows a Privilege Escalation.This issue affects Admin UI: from 6.2 before 6.2r.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2023-33833

Publication date:
31/08/2023
IBM Security Verify Information Queue 10.0.4 and 10.0.5 stores sensitive information in plain clear text which can be read by a local user. IBM X-Force ID: 256013.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2023

CVE-2023-41738

Publication date:
31/08/2023
Improper neutralization of special elements used in an OS command (&amp;#39;OS Command Injection&amp;#39;) vulnerability in Directory Domain Functionality in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote authenticated users to execute arbitrary commands via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023