Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-3722

Publication date:
19/07/2023
An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-37276

Publication date:
19/07/2023
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. aiohttp v3.8.4 and earlier are bundled with llhttp v6.0.6. Vulnerable code is used by aiohttp for its HTTP request parser when available which is the default case when installing from a wheel. This vulnerability only affects users of aiohttp as an HTTP server (ie `aiohttp.Application`), you are not affected by this vulnerability if you are using aiohttp as an HTTP client library (ie `aiohttp.ClientSession`). Sending a crafted HTTP request will cause the server to misinterpret one of the HTTP header values leading to HTTP request smuggling. This issue has been addressed in version 3.8.5. Users are advised to upgrade. Users unable to upgrade can reinstall aiohttp using `AIOHTTP_NO_EXTENSIONS=1` as an environment variable to disable the llhttp HTTP request parser implementation. The pure Python implementation isn't vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2023

CVE-2023-37899

Publication date:
19/07/2023
Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. Feathers socket handler did not catch invalid string conversion errors like `const message = ${{ toString: '' }}` which would cause the NodeJS process to crash when sending an unexpected Socket.io message like `socket.emit('find', { toString: '' })`. A fix has been released in versions 5.0.8 and 4.5.18. Users are advised to upgrade. There is no known workaround for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-3674

Publication date:
19/07/2023
A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2024

CVE-2023-3467

Publication date:
19/07/2023
Privilege Escalation to root administrator (nsroot)<br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-3466

Publication date:
19/07/2023
Reflected Cross-Site Scripting (XSS)<br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-37733

Publication date:
19/07/2023
An arbitrary file upload vulnerability in tduck-platform v4.0 allows attackers to execute arbitrary code via a crafted HTML file.
Severity CVSS v4.0: Pending analysis
Last modification:
26/07/2023

CVE-2023-3519

Publication date:
19/07/2023
Unauthenticated remote code execution
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2023-37748

Publication date:
19/07/2023
ngiflib commit 5e7292 was discovered to contain an infinite loop via the function DecodeGifImg at ngiflib.c.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-25838

Publication date:
19/07/2023
<br /> There is SQL injection vulnerability in Esri ArcGIS Insights 2022.1 for ArcGIS Enterprise and that may allow a remote, authorized attacker to execute arbitrary SQL commands against the back-end database. The effort required to generate the crafted input required to exploit this issue is complex and requires significant effort before a successful attack can be expected.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2024

CVE-2023-32263

Publication date:
19/07/2023
<br /> A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability could be exploited to retrieve a login certificate if an authenticated user is duped into using an attacker-controlled Dimensions CM server. This vulnerability only applies when the Jenkins plugin is configured to use login certificate credentials.<br /> <br /> <br /> https://www.jenkins.io/security/advisory/2023-06-14/ <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023

CVE-2023-32262

Publication date:
19/07/2023
<br /> A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability allows attackers with Item/Configure permission to access and capture credentials they are not entitled to.<br /> See the following Jenkins security advisory for details: * https://www.jenkins.io/security/advisory/2023-06-14/ https://www.jenkins.io/security/advisory/2023-06-14/ <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2023