Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-29158

Publication date:
19/06/2023
<br /> <br /> <br /> SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.<br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2023-34461

Publication date:
19/06/2023
PyBB is an open source bulletin board. A manual code review of the PyBB bulletin board server has revealed that a vulnerability could have been exploited in which users could submit any type of HTML tag, and have said tag run. For example, a malicious `` that looks like ```xss``` could have been used to run code through JavaScript on the client side. The problem has been patched as of commit `5defd92`, and users are advised to upgrade. Attackers do need posting privilege in order to exploit this vulnerability. This vulnerability is present within the 0.1.0 release, and users are advised to upgrade to 0.1.1. Users unable to upgrade may be able to work around the attack by either; Removing the ability to create posts, removing the `|safe` tag from the Jinja2 template titled "post.html" in templates or by adding manual validation of links in the post creation section.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2023-35843

Publication date:
19/06/2023
NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-3022

Publication date:
19/06/2023
A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2025

CVE-2023-3312

Publication date:
19/06/2023
A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2023-34159

Publication date:
19/06/2023
Improper permission control vulnerability in the Notepad app.Successful exploitation of the vulnerability may lead to privilege escalation, which affects availability and confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34167

Publication date:
19/06/2023
Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34166

Publication date:
19/06/2023
Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34163

Publication date:
19/06/2023
Permission control vulnerability in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34162

Publication date:
19/06/2023
Version update determination vulnerability in the user profile module.Successful exploitation of this vulnerability may cause repeated HMS Core updates and cause services to fail.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34161

Publication date:
19/06/2023
nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2023-34160

Publication date:
19/06/2023
Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024