Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-41916

Publication date:
15/07/2024
<br /> In Apache Linkis =1.4.0, due to the lack of effective filtering<br /> of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will trigger arbitrary file reading. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis = 1.4.0 will be affected. <br /> We recommend users upgrade the version of Linkis to version 1.5.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2023-46801

Publication date:
15/07/2024
<br /> In Apache Linkis
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2023-49566

Publication date:
15/07/2024
<br /> In Apache Linkis
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-23794

Publication date:
15/07/2024
An incorrect privilege assignment vulnerability in the inline editing functionality of OTRS can lead to privilege escalation. This flaw allows an agent with read-only permissions to gain full access to a ticket. This issue arises in very rare instances when an admin has previously enabled the setting &amp;#39;RequiredLock&amp;#39; of &amp;#39;AgentFrontend::Ticket::InlineEditing::Property###Watch&amp;#39; in the system configuration.This issue affects OTRS: <br /> <br /> * 8.0.X<br /> * 2023.X<br /> * from 2024.X through 2024.4.x<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6540

Publication date:
15/07/2024
Improper filtering of fields when using the export function in the ticket overview of the external interface in OTRS could allow an authorized user to download a list of tickets containing information about tickets of other customers. The problem only occurs if the TicketSearchLegacyEngine has been disabled by the administrator.<br /> This issue affects OTRS: 8.0.X, 2023.X, from 2024.X through 2024.4.x<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6743

Publication date:
15/07/2024
AguardNet&amp;#39;s Space Management System does not properly validate user input, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6744

Publication date:
15/07/2024
The SMTP Listener of Secure Email Gateway from Cellopoint does not properly validate user input, leading to a Buffer Overflow vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the remote server.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6072

Publication date:
15/07/2024
The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not escape the $_SERVER[&amp;#39;REQUEST_URI&amp;#39;] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-6073

Publication date:
15/07/2024
The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-6074

Publication date:
15/07/2024
The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-6075

Publication date:
15/07/2024
The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-6076

Publication date:
15/07/2024
The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024