Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-3287

Publication date:
09/07/2024
A BOLA vulnerability in POST /admins allows a low privileged user to create a high privileged user (admin) in the system. This results in privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-3288

Publication date:
09/07/2024
A BOLA vulnerability in POST /providers allows a low privileged user to create a privileged user (provider) in the system. This results in privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-3289

Publication date:
09/07/2024
A BOLA vulnerability in POST /services allows a low privileged user to create a service for any user in the system (including admin). This results in unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-3290

Publication date:
09/07/2024
A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38050

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} allows a low privileged user to fetch, modify or delete a webhook of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38051

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /secretaries/{secretaryId} allows a low privileged user to fetch, modify or delete a low privileged user (secretary). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38052

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /admins/{adminId} allows a low privileged user to fetch, modify or delete a high privileged user (admin). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38053

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38054

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /customers/{customerId} allows a low privileged user to fetch, modify or delete a low privileged user (customer). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38047

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /categories/{categoryId} allows a low privileged user to fetch, modify or delete the category of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38048

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /providers/{providerId} allows a low privileged user to fetch, modify or delete a privileged user (provider). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-38049

Publication date:
09/07/2024
A BOLA vulnerability in GET, PUT, DELETE /appointments/{appointmentId} allows a low privileged user to fetch, modify or delete an appointment of any user (including admin). This results in unauthorized access and unauthorized data manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024