Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-34392

Publication date:
31/08/2023
<br /> A Missing Authentication for Critical Function vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run arbitrary commands on managed devices by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-4683

Publication date:
31/08/2023
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-34391

Publication date:
31/08/2023
Insecure Inherited Permissions vulnerability in Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software on Windows allows Leveraging/Manipulating Configuration File Search Paths.<br /> <br /> See Instruction Manual Appendix A [Cybersecurity] tag dated 20230522 for more details.<br /> <br /> This issue affects SEL-5033 AcSELerator RTAC Software: before 1.35.151.21000.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-41743

Publication date:
31/08/2023
Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-41744

Publication date:
31/08/2023
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2023

CVE-2023-41717

Publication date:
31/08/2023
Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
07/09/2023

CVE-2023-31175

Publication date:
31/08/2023
<br /> An Execution with Unnecessary Privileges vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run system commands with the highest level privilege on the system.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31174

Publication date:
31/08/2023
<br /> A Cross-Site Request Forgery (CSRF) vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31172

Publication date:
31/08/2023
<br /> An Incomplete Filtering of Special Elements vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31171

Publication date:
31/08/2023
<br /> An Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31170

Publication date:
31/08/2023
<br /> An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> <br /> <br /> <br /> <br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023

CVE-2023-31169

Publication date:
31/08/2023
<br /> An Improper Handling of Unicode Encoding vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.<br /> <br /> <br /> <br /> <br /> <br /> See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.<br /> This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2023