Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-26013

Publication date:
16/06/2023
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WPChill Strong Testimonials plugin
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2023

CVE-2023-25963

Publication date:
16/06/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in JoomSky JS Job Manager plugin
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2023

CVE-2023-2783

Publication date:
16/06/2023
Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2023

CVE-2023-26541

Publication date:
16/06/2023
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alexander Suess asMember plugin
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2023

CVE-2023-2784

Publication date:
16/06/2023
Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2023

CVE-2023-2788

Publication date:
16/06/2023
Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker&amp;#39;s account is deactivated.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2023-2787

Publication date:
16/06/2023
Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2023-2786

Publication date:
16/06/2023
Mattermost fails to properly check the permissions when executing commands allowing a member with no permissions to post a message in a channel to actually post it by executing channel commands.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023

CVE-2023-2431

Publication date:
16/06/2023
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34165

Publication date:
16/06/2023
Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2023-34157

Publication date:
16/06/2023
Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app.
Severity CVSS v4.0: Pending analysis
Last modification:
17/12/2024

CVE-2023-34154

Publication date:
16/06/2023
Vulnerability of undefined permissions in HUAWEI VR screen projection.Successful exploitation of this vulnerability will cause third-party apps to create windows in an arbitrary way, consuming system resources.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2023