Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-47110

Publication date:
09/11/2023
blockreassurance adds an information block aimed at offering helpful information to reassure customers that their store is trustworthy. An ajax function in module blockreassurance allows modifying any value in the configuration table. This vulnerability has been patched in version 5.1.4.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2023-47372

Publication date:
09/11/2023
The leakage of channel access token in UPDATESALON C-LOUNGE Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47373

Publication date:
09/11/2023
The leakage of channel access token in DRAGON FAMILY Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-6039

Publication date:
09/11/2023
A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2023-40055

Publication date:
09/11/2023
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33227
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2023

CVE-2023-41137

Publication date:
09/11/2023
Symmetric encryption used to protect messages between the AppsAnywhere server and client can be broken by reverse engineering the client and used to impersonate the AppsAnywhere server.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2024

CVE-2023-41138

Publication date:
09/11/2023
The AppsAnywhere macOS client-privileged helper can be tricked into executing arbitrary commands with elevated permissions by a local user process.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2023-43791

Publication date:
09/11/2023
Label Studio is a multi-type data labeling and annotation tool with standardized output format. There is a vulnerability that can be chained within the ORM Leak vulnerability to impersonate any account on Label Studio. An attacker could exploit these vulnerabilities to escalate their privileges from a low privilege user to a Django Super Administrator user. The vulnerability was found to affect versions before `1.8.2`, where a patch was introduced.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2023

CVE-2023-47368

Publication date:
09/11/2023
The leakage of channel access token in taketorinoyu Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-47370

Publication date:
09/11/2023
The leakage of channel access token in bluetrick Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2023

CVE-2023-40054

Publication date:
09/11/2023
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2023

CVE-2023-47365

Publication date:
09/11/2023
The leakage of channel access token in Lil.OFF-PRICE STORE Line 13.6.1 allows remote attackers to send malicious notifications to victims.
Severity CVSS v4.0: Pending analysis
Last modification:
28/12/2023