Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-20016

Publication date:
23/02/2023
A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup configuration feature. A successful exploit could allow the attacker to decrypt sensitive information that is stored in full state and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and other credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-20012

Publication date:
23/02/2023
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-23916

Publication date:
23/02/2023
An allocation of resources without limits or throttling vulnerability exists in curl
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2023-23915

Publication date:
23/02/2023
A cleartext transmission of sensitive information vulnerability exists in curl
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2026

CVE-2022-46786

Publication date:
23/02/2023
SquaredUp Dashboard Server SCOM edition before 5.7.1 GA allows XSS (issue 2 of 2).
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2023

CVE-2023-0044

Publication date:
23/02/2023
If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2023

CVE-2022-3219

Publication date:
23/02/2023
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2023-0597

Publication date:
23/02/2023
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2022-4492

Publication date:
23/02/2023
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2023-22476

Publication date:
23/02/2023
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions prior to 2.25.6, due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. This issue is fixed in version 2.25.6. There are no workarounds.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2176

Publication date:
23/02/2023
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-48342

Publication date:
23/02/2023
In JetBrains TeamCity before 2022.10.2 jVMTI was enabled by default on agents.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2023