Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-28318

Publication date:
09/05/2023
A vulnerability has been discovered in Rocket.Chat, where messages can be hidden regardless of the Message_KeepHistory or Message_ShowDeletedStatus server configuration. This allows users to bypass the intended message deletion behavior, hiding messages and deletion notices.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-2156

Publication date:
09/05/2023
A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2024

CVE-2023-2610

Publication date:
09/05/2023
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-28128

Publication date:
09/05/2023
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to achieve a remove code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-28127

Publication date:
09/05/2023
A path traversal vulnerability exists in Avalanche version 6.3.x and below that when exploited could result in possible information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-28126

Publication date:
09/05/2023
An authentication bypass vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to gain access by exploiting the SetUser method or can exploit the Race Condition in the authentication message.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-28125

Publication date:
09/05/2023
An improper authentication vulnerability exists in Avalanche Premise versions 6.3.x and below that could allow an attacker to gain access to the server by registering to receive messages from the server and perform an authentication bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-28316

Publication date:
09/05/2023
A security vulnerability has been discovered in the implementation of 2FA on the rocket.chat platform, where other active sessions are not invalidated upon activating 2FA. This could potentially allow an attacker to maintain access to a compromised account even after 2FA is enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-30057

Publication date:
09/05/2023
Multiple stored cross-site scripting (XSS) vulnerabilities in FICO Origination Manager Decision Module 4.8.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2023-30056

Publication date:
09/05/2023
A session takeover vulnerability exists in FICO Origination Manager Decision Module 4.8.1 due to insufficient protection of the JSESSIONID cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-25831

Publication date:
09/05/2023
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2023-25832

Publication date:
09/05/2023
There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.0 and below that may allow an attacker to trick an authorized user into executing unwanted actions.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2024