Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-0607

Publication date:
18/01/2024
A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024

CVE-2023-40051

Publication date:
18/01/2024
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2024

CVE-2023-40052

Publication date:
18/01/2024
<br /> <br /> <br /> This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0<br /> <br /> . <br /> <br /> An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2024

CVE-2023-7153

Publication date:
18/01/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Macroturk Software and Internet Technologies Macro-Bel allows Reflected XSS.This issue affects Macro-Bel: before V.1.0.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2024

CVE-2024-22548

Publication date:
18/01/2024
FlyCms 1.0 is vulnerable to Cross Site Scripting (XSS) in the system website settings website name section.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025

CVE-2024-22549

Publication date:
18/01/2024
FlyCms 1.0 is vulnerable to Cross Site Scripting (XSS) in the email settings of the website settings section.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-22568

Publication date:
18/01/2024
FlyCms v1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability via /system/score/del.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-22591

Publication date:
18/01/2024
FlyCms v1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability via /system/user/group_save.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-22592

Publication date:
18/01/2024
FlyCms v1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability via /system/user/group_update
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2025

CVE-2024-22593

Publication date:
18/01/2024
FlyCms v1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability via /system/admin/add_group_save
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2021-33630

Publication date:
18/01/2024
NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C.<br /> <br /> This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-33631

Publication date:
18/01/2024
Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025