Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-39612

Publication date:
16/09/2023
A cross-site scripting (XSS) vulnerability in FileBrowser before v2.23.0 allows an authenticated attacker to escalate privileges to Administrator via user interaction with a crafted HTML file or URL.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2023-41436

Publication date:
16/09/2023
Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-36160

Publication date:
16/09/2023
An issue was discovered in Qubo Smart Plug10A version HSP02_01_01_14_SYSTEM-10 A, allows local attackers to gain sensitive information and other unspecified impact via UART console.
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2023

CVE-2023-41626

Publication date:
15/09/2023
Gradio v3.27.0 was discovered to contain an arbitrary file upload vulnerability via the /upload interface.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2023

CVE-2023-36562

Publication date:
15/09/2023
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2025

CVE-2023-36727

Publication date:
15/09/2023
Microsoft Edge (Chromium-based) Spoofing Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2025

CVE-2023-36735

Publication date:
15/09/2023
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2025

CVE-2023-41886

Publication date:
15/09/2023
OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, an arbitrary file read vulnerability allows any unauthenticated user to read a file on a server. Version 3.7.5 fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-41887

Publication date:
15/09/2023
OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, a remote code execution vulnerability allows any unauthenticated user to execute code on the server. Version 3.7.5 has a patch for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-41889

Publication date:
15/09/2023
SHIRASAGI is a Content Management System. Prior to version 1.18.0, SHIRASAGI is vulnerable to a Post-Unicode normalization issue. This happens when a logical validation or a security check is performed before a Unicode normalization. The Unicode character equivalent of a character would resurface after the normalization. The fix is initially performing the Unicode normalization and then strip for all whitespaces and then checking for a blank string. This issue has been fixed in version 1.18.0.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-42442

Publication date:
15/09/2023
JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).<br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-41901

Publication date:
15/09/2023
Rejected reason: Further research determined the issue is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023