Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-41768

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41769

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41770

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41771

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41772

Publication date:
10/10/2023
Win32k Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41773

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41774

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-42794

Publication date:
10/10/2023
Incomplete Cleanup vulnerability in Apache Tomcat.<br /> <br /> The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, <br /> in progress refactoring that exposed a potential denial of service on <br /> Windows if a web application opened a stream for an uploaded file but <br /> failed to close the stream. The file would never be deleted from disk <br /> creating the possibility of an eventual denial of service due to the <br /> disk being full.<br /> <br /> Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-41763

Publication date:
10/10/2023
Skype for Business Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2024

CVE-2023-42795

Publication date:
10/10/2023
Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could <br /> cause Tomcat to skip some parts of the recycling process leading to <br /> information leaking from the current request/response to the next.<br /> <br /> Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2023-36902

Publication date:
10/10/2023
Windows Runtime Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-38159

Publication date:
10/10/2023
Windows Graphics Component Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024