Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-47540

Publication date:
09/04/2024
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.2, FortiSandbox 4.2.1 through 4.2.6, FortiSandbox 4.0 all versions, FortiSandbox 3.2 all versions, FortiSandbox 3.0.5 through 3.0.7 allows attacker to execute unauthorized code or commands via CLI.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2026

CVE-2023-6319

Publication date:
09/04/2024
A command injection vulnerability exists in the getAudioMetadata method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.<br /> <br /> * webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA <br /> <br /> * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA <br /> <br /> * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB <br /> <br /> * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-6320

Publication date:
09/04/2024
A command injection vulnerability exists in the com.webos.service.connectionmanager/tv/setVlanStaticAddress endpoint on webOS versions 5 and 6. A series of specially crafted requests can lead to command execution as the dbus user. An attacker can make authenticated requests to trigger this vulnerability.<br /> <br /> Full versions and TV models affected:<br /> * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA <br /> <br /> * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-28190

Publication date:
09/04/2024
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.
Severity CVSS v4.0: Pending analysis
Last modification:
16/01/2025

CVE-2024-28191

Publication date:
09/04/2024
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025

CVE-2024-28234

Publication date:
09/04/2024
Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2023-6317

Publication date:
09/04/2024
A prompt bypass exists in the secondscreen.gateway service running on webOS version 4 through 7. An attacker can create a privileged account without asking the user for the security PIN. <br /> <br /> Full versions and TV models affected:<br /> <br /> webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA <br /> webOS 5.5.0 - 04.50.51 running on OLED55CXPUA <br /> webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB  <br /> webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-6318

Publication date:
09/04/2024
A command injection vulnerability exists in the processAnalyticsReport method from the com.webos.service.cloudupload service on webOS version 5 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.<br /> <br /> Full versions and TV models affected:<br /> <br /> * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA <br /> <br /> * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB <br /> <br /> * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-2223

Publication date:
09/04/2024
An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component: <br /> <br /> Bitdefender Endpoint Security for Linux version 7.0.5.200089<br /> Bitdefender Endpoint Security for  Windows version 7.9.9.380<br /> GravityZone Control Center (On Premises) version 6.36.1<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-2224

Publication date:
09/04/2024
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects the following products that include the vulnerable component: <br /> <br /> Bitdefender Endpoint Security for Linux version 7.0.5.200089<br /> Bitdefender Endpoint Security for Windows version 7.9.9.380<br /> GravityZone Control Center (On Premises) version 6.36.1<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-31544

Publication date:
09/04/2024
A stored cross-site scripting (XSS) vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary JavaScript code by including malicious payloads into “remarks”, “borrower_name”, “faculty_department” parameters in /classes/Master.php?f=save_record.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2024-31863

Publication date:
09/04/2024
Authentication Bypass by Spoofing vulnerability by replacing to exsiting notes in Apache Zeppelin.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0.<br /> <br /> Users are recommended to upgrade to version 0.11.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025