Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-43472

Publication date:
05/12/2023
An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-44295

Publication date:
05/12/2023
<br /> Dell PowerScale OneFS versions 8.2.2.x through 9.6.0.x contains an improper control of a resource through its lifetime vulnerability. A low privilege attacker could potentially exploit this vulnerability, leading to loss of information, and information disclosure.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2026

CVE-2022-47531

Publication date:
05/12/2023
An issue was discovered in Ericsson Evolved Packet Gateway (EPG) versions 3.x before 3.25 and 2.x before 2.16, allows authenticated users to bypass system CLI and execute commands they are authorized to execute directly in the UNIX shell.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-37572

Publication date:
05/12/2023
Softing OPC Suite version 5.25 and before has Incorrect Access Control, allows attackers to obtain sensitive information via weak permissions in OSF_discovery service. The service executable could be changed or the service could be deleted.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2023-39248

Publication date:
05/12/2023
<br /> Dell OS10 Networking Switches running 10.5.2.x and above contain an Uncontrolled Resource Consumption (Denial of Service) vulnerability, when switches are configured with VLT and VRRP. A remote unauthenticated user can cause the network to be flooded leading to Denial of Service for actual network users. This is a high severity vulnerability as it allows an attacker to cause an outage of network. Dell recommends customers to upgrade at the earliest opportunity.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-44288

Publication date:
05/12/2023
<br /> Dell PowerScale OneFS, 8.2.2.x through 9.6.0.x, contains an improper control of a resource through its lifetime vulnerability. An unauthenticated network attacker could potentially exploit this vulnerability, leading to denial of service.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2026

CVE-2023-47304

Publication date:
05/12/2023
An issue was discovered in Vonage Box Telephone Adapter VDV23 version VDV21-3.2.11-0.5.1, allows local attackers to bypass UART authentication controls and read/write arbitrary values to the memory of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-42580

Publication date:
05/12/2023
Improper URL validation from MCSLaunch deeplink in Galaxy Store prior to version 4.5.64.4 allows attackers to execute JavaScript API to install APK from Galaxy Store.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2023

CVE-2023-42581

Publication date:
05/12/2023
Improper URL validation from InstantPlay deeplink in Galaxy Store prior to version 4.5.64.4 allows attackers to execute JavaScript API to access data.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2023-42574

Publication date:
05/12/2023
Improper access control vulnerablility in GameHomeCN prior to version 4.2.60.2 allows local attackers to launch arbitrary activity in GameHomeCN.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-42575

Publication date:
05/12/2023
Improper Authentication vulnerability in Samsung Pass prior to version 4.3.00.17 allows physical attackers to bypass authentication due to invalid flag setting.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023

CVE-2023-42576

Publication date:
05/12/2023
Improper Authentication vulnerability in Samsung Pass prior to version 4.3.00.17 allows physical attackers to bypass authentication due to invalid exception handler.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2023