Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-1108

Publication date:
14/09/2023
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2024

CVE-2023-30909

Publication date:
14/09/2023
A remote authentication bypass issue exists in some<br /> OneView APIs.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2024

CVE-2021-28485

Publication date:
14/09/2023
In Ericsson Mobile Switching Center Server (MSC-S) before IS 3.1 CP22, the SIS web application allows relative path traversal via a specific parameter in the https request after authentication, which allows access to files on the system that are not intended to be accessible via the web application.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2023-2848

Publication date:
14/09/2023
Movim prior to version 0.22 is affected by a Cross-Site WebSocket Hijacking vulnerability. This was the result of a missing header validation.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-38557

Publication date:
14/09/2023
A vulnerability has been identified in Spectrum Power 7 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
21/09/2023

CVE-2023-38558

Publication date:
14/09/2023
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-4516

Publication date:
14/09/2023
<br /> A CWE-306: Missing Authentication for Critical Function vulnerability exists in the IGSS Update<br /> Service that could allow a local attacker to change update source, potentially leading to remote<br /> code execution when the attacker force an update containing malicious content.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2023

CVE-2023-42503

Publication date:
14/09/2023
Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.This issue affects Apache Commons Compress: from 1.22 before 1.24.0.<br /> <br /> Users are recommended to upgrade to version 1.24.0, which fixes the issue.<br /> <br /> A third party can create a malformed TAR file by manipulating file modification times headers, which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption.<br /> <br /> In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision (issue # COMPRESS-612 [1]). The format for the PAX extended headers carrying this data consists of two numbers separated by a period [2], indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and “LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values.<br /> <br /> Parsing of these numbers uses the BigDecimal [3] class from the JDK which has a publicly known algorithmic complexity issue when doing operations on large numbers, causing denial of service (see issue # JDK-6560193 [4]). A third party can manipulate file time headers in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”) within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098 [5].<br /> <br /> [1]: https://issues.apache.org/jira/browse/COMPRESS-612 <br /> [2]: https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05 <br /> [3]: https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html <br /> [4]: https://bugs.openjdk.org/browse/JDK-6560193 <br /> [5]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098 <br /> <br /> Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-38204

Publication date:
14/09/2023
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2023

CVE-2023-38205

Publication date:
14/09/2023
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2023-38206

Publication date:
14/09/2023
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints resulting in a low-confidentiality impact. Exploitation of this issue does not require user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2023

CVE-2023-41267

Publication date:
14/09/2023
In the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025