Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-47233

Publication date:
03/11/2023
The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2023-47234

Publication date:
03/11/2023
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-47235

Publication date:
03/11/2023
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-41725

Publication date:
03/11/2023
Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Local Privilege Escalation Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2023-41726

Publication date:
03/11/2023
Ivanti Avalanche Incorrect Default Permissions allows Local Privilege Escalation Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2024

CVE-2022-3172

Publication date:
03/11/2023
A security issue was discovered in kube-apiserver that allows an <br /> aggregated API server to redirect client traffic to any URL. This could<br /> lead to the client performing unexpected actions as well as forwarding <br /> the client&amp;#39;s API server credentials to third parties.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2022-43554

Publication date:
03/11/2023
Ivanti Avalanche Smart Device Service Missing Authentication Local Privilege Escalation Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2022-43555

Publication date:
03/11/2023
Ivanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2022-44569

Publication date:
03/11/2023
A locally authenticated attacker with low privileges can bypass authentication due to insecure inter-process communication.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2023-3893

Publication date:
03/11/2023
A security issue was discovered in Kubernetes where a user that can <br /> create pods on Windows nodes running kubernetes-csi-proxy may be able to<br /> escalate to admin privileges on those nodes. Kubernetes clusters are <br /> only affected if they include Windows nodes running <br /> kubernetes-csi-proxy.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2025

CVE-2023-23368

Publication date:
03/11/2023
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following versions:<br /> QTS 5.0.1.2376 build 20230421 and later<br /> QTS 4.5.4.2374 build 20230416 and later<br /> QuTS hero h5.0.1.2376 build 20230421 and later<br /> QuTS hero h4.5.4.2374 build 20230417 and later<br /> QuTScloud c5.0.1.2374 and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2023-23369

Publication date:
03/11/2023
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following versions:<br /> Multimedia Console 2.1.2 ( 2023/05/04 ) and later<br /> Multimedia Console 1.4.8 ( 2023/05/05 ) and later<br /> QTS 5.1.0.2399 build 20230515 and later<br /> QTS 4.3.6.2441 build 20230621 and later<br /> QTS 4.3.4.2451 build 20230621 and later<br /> QTS 4.3.3.2420 build 20230621 and later<br /> QTS 4.2.6 build 20230621 and later<br /> Media Streaming add-on 500.1.1.2 ( 2023/06/12 ) and later<br /> Media Streaming add-on 500.0.0.11 ( 2023/06/16 ) and later<br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023