Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-43485

Publication date:
10/10/2023
<br /> When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the audit log.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2023

CVE-2023-43611

Publication date:
10/10/2023
<br /> The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process.  This vulnerability is due to an incomplete fix for CVE-2023-38418.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-43746

Publication date:
10/10/2023
<br /> When running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing BIG-IP external monitor on a BIG-IP system.  A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2023

CVE-2023-43785

Publication date:
10/10/2023
A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-39447

Publication date:
10/10/2023
<br /> When BIG-IP APM Guided Configurations are configured, undisclosed sensitive information may be logged in restnoded log.  <br /> <br /> Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2023

CVE-2023-40534

Publication date:
10/10/2023
When a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2023

CVE-2023-40537

Publication date:
10/10/2023
<br /> An authenticated user&amp;#39;s session cookie may remain valid for a limited time after logging out from the BIG-IP Configuration utility on a multi-blade VIPRION platform. <br /> <br /> Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2023

CVE-2023-40542

Publication date:
10/10/2023
When TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2023-44763

Publication date:
10/10/2023
Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor&amp;#39;s position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2024

CVE-2023-45204

Publication date:
10/10/2023
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2023

CVE-2023-45205

Publication date:
10/10/2023
A vulnerability has been identified in SICAM PAS/PQS (All versions &gt;= V8.00
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2024

CVE-2023-45601

Publication date:
10/10/2023
A vulnerability has been identified in Parasolid V35.0 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2023