Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6576

Publication date:
29/07/2024
Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Privilege Escalation.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.12, from 2023.1.0 before 2023.1.7, from 2024.0.0 before 2024.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2025

CVE-2024-6984

Publication date:
29/07/2024
An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2024

CVE-2024-40576

Publication date:
29/07/2024
Cross Site Scripting vulnerability in Best House Rental Management System 1.0 allows a remote attacker to execute arbitrary code via the "House No" and "Description" parameters in the houses page at the index.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2024-41021

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()<br /> <br /> There is no support for HWPOISON, MEMORY_FAILURE, or ARCH_HAS_COPY_MC on<br /> s390. Therefore we do not expect to see VM_FAULT_HWPOISON in<br /> do_exception().<br /> <br /> However, since commit af19487f00f3 ("mm: make PTE_MARKER_SWAPIN_ERROR more<br /> general"), it is possible to see VM_FAULT_HWPOISON in combination with<br /> PTE_MARKER_POISONED, even on architectures that do not support HWPOISON<br /> otherwise. In this case, we will end up on the BUG() in do_exception().<br /> <br /> Fix this by treating VM_FAULT_HWPOISON the same as VM_FAULT_SIGBUS, similar<br /> to x86 when MEMORY_FAILURE is not configured. Also print unexpected fault<br /> flags, for easier debugging.<br /> <br /> Note that VM_FAULT_HWPOISON_LARGE is not expected, because s390 cannot<br /> support swap entries on other levels than PTE level.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2024-41020

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> filelock: Fix fcntl/close race recovery compat path<br /> <br /> When I wrote commit 3cad1bc01041 ("filelock: Remove locks reliably when<br /> fcntl/close race is detected"), I missed that there are two copies of the<br /> code I was patching: The normal version, and the version for 64-bit offsets<br /> on 32-bit kernels.<br /> Thanks to Greg KH for stumbling over this while doing the stable<br /> backport...<br /> <br /> Apply exactly the same fix to the compat path for 32-bit kernels.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-41022

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()<br /> <br /> The "instance" variable needs to be signed for the error handling to work.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-7199

Publication date:
29/07/2024
A vulnerability classified as critical was found in SourceCodester Complaints Report Management System 1.0. This vulnerability affects unknown code of the file /admin/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272620.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-7200

Publication date:
29/07/2024
A vulnerability, which was classified as problematic, has been found in SourceCodester Complaints Report Management System 1.0. This issue affects some unknown processing of the file /admin/ajax.php?action=save_settings. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272621 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-6124

Publication date:
29/07/2024
Reflected XSS in M-Files Hubshare before version 5.0.6.0 allows an attacker to execute arbitrary JavaScript code in the context of the victim&amp;#39;s browser session
Severity CVSS v4.0: HIGH
Last modification:
23/02/2026

CVE-2024-6881

Publication date:
29/07/2024
Stored XSS in M-Files Hubshare versions before 5.0.6.0 allows an authenticated attacker to execute arbitrary JavaScript in user&amp;#39;s browser session
Severity CVSS v4.0: HIGH
Last modification:
23/02/2026

CVE-2024-7197

Publication date:
29/07/2024
A vulnerability was found in SourceCodester Complaints Report Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/manage_complaint.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-272618 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-7198

Publication date:
29/07/2024
A vulnerability classified as critical has been found in SourceCodester Complaints Report Management System 1.0. This affects an unknown part of the file /admin/manage_station.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272619.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024