Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-26584

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: tls: handle backlogging of crypto requests<br /> <br /> Since we&amp;#39;re setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our<br /> requests to the crypto API, crypto_aead_{encrypt,decrypt} can return<br /> -EBUSY instead of -EINPROGRESS in valid situations. For example, when<br /> the cryptd queue for AESNI is full (easy to trigger with an<br /> artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued<br /> to the backlog but still processed. In that case, the async callback<br /> will also be called twice: first with err == -EINPROGRESS, which it<br /> seems we can just ignore, then with err == 0.<br /> <br /> Compared to Sabrina&amp;#39;s original patch this version uses the new<br /> tls_*crypt_async_wait() helpers and converts the EBUSY to<br /> EINPROGRESS to avoid having to modify all the error handling<br /> paths. The handling is identical.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-26585

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: fix race between tx work scheduling and socket close<br /> <br /> Similarly to previous commit, the submitting thread (recvmsg/sendmsg)<br /> may exit as soon as the async crypto handler calls complete().<br /> Reorder scheduling the work before calling complete().<br /> This seems more logical in the first place, as it&amp;#39;s<br /> the inverse order of what the submitting thread will do.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-33843

Publication date:
21/02/2024
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 256544.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2024

CVE-2023-50955

Publication date:
21/02/2024
IBM InfoSphere Information Server 11.7 could allow an authenticated privileged user to obtain the absolute path of the web server installation which could aid in further attacks against the system. IBM X-Force ID: 275777.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2024

CVE-2023-47795

Publication date:
21/02/2024
Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document&amp;#39;s “Title” text field.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-7235

Publication date:
21/02/2024
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2024-24802

Publication date:
21/02/2024
Cross-Site Request Forgery (CSRF) vulnerability in John Tendik JTRT Responsive Tables.This issue affects JTRT Responsive Tables: from n/a through 4.1.9.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2024-24837

Publication date:
21/02/2024
Cross-Site Request Forgery (CSRF) vulnerability in Frédéric GILLES FG PrestaShop to WooCommerce, Frédéric GILLES FG Drupal to WordPress, Frédéric GILLES FG Joomla to WordPress.This issue affects FG PrestaShop to WooCommerce: from n/a through 4.44.3; FG Drupal to WordPress: from n/a through 3.67.0; FG Joomla to WordPress: from n/a through 4.15.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2023-52440

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()<br /> <br /> If authblob-&gt;SessionKey.Length is bigger than session key<br /> size(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes.<br /> cifs_arc4_crypt copy to session key array from SessionKey from client.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2024

CVE-2023-52441

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: fix out of bounds in init_smb2_rsp_hdr()<br /> <br /> If client send smb2 negotiate request and then send smb1 negotiate<br /> request, init_smb2_rsp_hdr is called for smb1 negotiate request since<br /> need_neg is set to false. This patch ignore smb1 packets after -&gt;need_neg<br /> is set to false.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2024

CVE-2023-52442

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: validate session id and tree id in compound request<br /> <br /> `smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session()<br /> will always return the first request smb2 header in a compound request.<br /> if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will<br /> return 0, i.e. The tree id check is skipped.<br /> This patch use ksmbd_req_buf_next() to get current command in compound.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2024-24798

Publication date:
21/02/2024
Cross-Site Request Forgery (CSRF) vulnerability in SoniNow Team Debug.This issue affects Debug: from n/a through 1.10.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025