Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-45312

Publication date:
10/10/2023
In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2023-31096

Publication date:
10/10/2023
An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver through 2.2.100.1 (aka AGRSM64.sys). There is Local Privilege Escalation to SYSTEM via a Stack Overflow in RTLCopyMemory (IOCTL 0x1b2150). An attacker can exploit this to elevate privileges from a medium-integrity process to SYSTEM. This can also be used to bypass kernel-level protections such as AV or PPL, because exploit code runs with high-integrity privileges and can be used in coordinated BYOVD (bring your own vulnerable driver) ransomware campaigns.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-45648

Publication date:
10/10/2023
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially <br /> crafted, invalid trailer header could cause Tomcat to treat a single <br /> request as multiple requests leading to the possibility of request <br /> smuggling when behind a reverse proxy.<br /> <br /> Older, EOL versions may also be affected.<br /> <br /> <br /> Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025

CVE-2023-45129

Publication date:
10/10/2023
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Prior to version 1.94.0, a malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. Server administrators are advised to upgrade to Synapse 1.94.0 or later. As a workaround, rooms with malicious server ACL events can be purged and blocked using the admin API.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2024

CVE-2023-4309

Publication date:
10/10/2023
Election Services Co. (ESC) Internet Election Service is vulnerable to SQL injection in multiple pages and parameters. These vulnerabilities allow an unauthenticated, remote attacker to read or modify data for any elections that share the same backend database. ESC deactivated older and unused elections and enabled web application firewall (WAF) protection for current and future elections on or around 2023-08-12.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-5497

Publication date:
10/10/2023
A vulnerability classified as critical has been found in Tongda OA 2017 11.10. Affected is an unknown function of the file general/hr/salary/welfare_manage/delete.php. The manipulation of the argument WELFARE_ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-241650 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-42794

Publication date:
10/10/2023
Incomplete Cleanup vulnerability in Apache Tomcat.<br /> <br /> The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, <br /> in progress refactoring that exposed a potential denial of service on <br /> Windows if a web application opened a stream for an uploaded file but <br /> failed to close the stream. The file would never be deleted from disk <br /> creating the possibility of an eventual denial of service due to the <br /> disk being full.<br /> <br /> Other, EOL versions may also be affected.<br /> <br /> <br /> Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2025

CVE-2023-41763

Publication date:
10/10/2023
Skype for Business Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2023-38166

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-38171

Publication date:
10/10/2023
Microsoft QUIC Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41765

Publication date:
10/10/2023
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-41766

Publication date:
10/10/2023
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024