Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-5255

Publication date:
03/10/2023
For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2025

CVE-2023-4911

Publication date:
03/10/2023
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2023-33200

Publication date:
03/10/2023
A local non-privileged user can make improper GPU processing operations to exploit a software race condition. If the system’s memory is carefully prepared by the user, then this in turn could give them access to already freed memory.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2025

CVE-2023-34970

Publication date:
03/10/2023
A local non-privileged user can make improper GPU processing operations to access a limited amount outside of buffer bounds or to exploit a software race condition. If the system’s memory is carefully prepared by the user, then this in turn could give them access to already freed memory<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2025

CVE-2023-4732

Publication date:
03/10/2023
A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2024

CVE-2023-2222

Publication date:
03/10/2023
Rejected reason: This was deemed not a security vulnerability by upstream.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-3196

Publication date:
03/10/2023
This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2023-4564

Publication date:
03/10/2023
This vulnerability could allow an attacker to store a malicious JavaScript payload in the broadcast message parameter within the admin panel.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2023-4817

Publication date:
03/10/2023
This vulnerability allows an authenticated attacker to upload malicious files by bypassing the restrictions of the upload functionality, compromising the entire device.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2023

CVE-2023-4882

Publication date:
03/10/2023
DOS vulnerability that could allow an attacker to register a new VNF (Virtual Network Function) value. This action could trigger the args_assets() function defined in the arg-log.php file, which would then execute the args-abort.c file, causing the service to crash.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2023

CVE-2023-4883

Publication date:
03/10/2023
Invalid pointer release vulnerability. Exploitation of this vulnerability could allow an attacker to interrupt the correct operation of the service by sending a specially crafted json string to the VNF (Virtual Network Function), and triggering the ogs_sbi_message_free function, which could cause a service outage.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2023

CVE-2023-4884

Publication date:
03/10/2023
An attacker could send an HTTP request to an Open5GS endpoint and retrieve the information stored on the device due to the lack of Authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
05/10/2023