Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-28316

Publication date:
09/05/2023
A security vulnerability has been discovered in the implementation of 2FA on the rocket.chat platform, where other active sessions are not invalidated upon activating 2FA. This could potentially allow an attacker to maintain access to a compromised account even after 2FA is enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-30057

Publication date:
09/05/2023
Multiple stored cross-site scripting (XSS) vulnerabilities in FICO Origination Manager Decision Module 4.8.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-30056

Publication date:
09/05/2023
A session takeover vulnerability exists in FICO Origination Manager Decision Module 4.8.1 due to insufficient protection of the JSESSIONID cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-25831

Publication date:
09/05/2023
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2023-25832

Publication date:
09/05/2023
There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.0 and below that may allow an attacker to trick an authorized user into executing unwanted actions.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2024

CVE-2021-46794

Publication date:
09/05/2023
Insufficient bounds checking in ASP (AMD Secure<br /> Processor) may allow for an out of bounds read in SMI (System Management<br /> Interface) mailbox checksum calculation triggering a data abort, resulting in a<br /> potential denial of service.<br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2021-46765

Publication date:
09/05/2023
Insufficient input validation in ASP may allow<br /> an attacker with a compromised SMM to induce out-of-bounds memory reads within<br /> the ASP, potentially leading to a denial of service.<br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2021-46760

Publication date:
09/05/2023
A malicious or compromised UApp or ABL can send<br /> a malformed system call to the bootloader, which may result in an out-of-bounds<br /> memory access that may potentially lead to an attacker leaking sensitive<br /> information or achieving code execution.<br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2021-46759

Publication date:
09/05/2023
Improper syscall input validation in AMD TEE<br /> (Trusted Execution Environment) may allow an attacker with physical access and<br /> control of a Uapp that runs under the bootloader to reveal the contents of the<br /> ASP (AMD Secure Processor) bootloader accessible memory to a serial port,<br /> resulting in a potential loss of integrity.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2021-46756

Publication date:
09/05/2023
Insufficient validation of inputs in<br /> SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an<br /> attacker with a malicious Uapp or ABL to send malformed or invalid syscall to<br /> the bootloader resulting in a potential denial of service and loss of<br /> integrity.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2021-46755

Publication date:
09/05/2023
Failure to unmap certain SysHub mappings in<br /> error paths of the ASP (AMD Secure Processor) bootloader may allow an attacker<br /> with a malicious bootloader to exhaust the SysHub resources resulting in a<br /> potential denial of service.<br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2021-46754

Publication date:
09/05/2023
Insufficient input validation in the ASP (AMD<br /> Secure Processor) bootloader may allow an attacker with a compromised Uapp or<br /> ABL to coerce the bootloader into exposing sensitive information to the SMU<br /> (System Management Unit) resulting in a potential loss of confidentiality and<br /> integrity.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2024