Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-28949

Publication date:
05/04/2024
Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don&amp;#39;t limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2024-29221

Publication date:
05/04/2024
Improper Access Control in Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 lacked proper access control in the `/api/v4/users/me/teams` endpoint allowing a team admin to get the invite ID of their team, thus allowing them to invite users, even if the "Add Members" permission was explicitly removed from team admins. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2024

CVE-2024-2447

Publication date:
05/04/2024
Mattermost versions 8.1.x before 8.1.11, 9.3.x before 9.3.3, 9.4.x before 9.4.4, and 9.5.x before 9.5.2 fail to authenticate the source of certain types of post actions, allowing an authenticated attacker to create posts as other users via a crafted post action.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2024

CVE-2024-26810

Publication date:
05/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vfio/pci: Lock external INTx masking ops<br /> <br /> Mask operations through config space changes to DisINTx may race INTx<br /> configuration changes via ioctl. Create wrappers that add locking for<br /> paths outside of the core interrupt code.<br /> <br /> In particular, irq_type is updated holding igate, therefore testing<br /> is_intx() requires holding igate. For example clearing DisINTx from<br /> config space can otherwise race changes of the interrupt configuration.<br /> <br /> This aligns interfaces which may trigger the INTx eventfd into two<br /> camps, one side serialized by igate and the other only enabled while<br /> INTx is configured. A subsequent patch introduces synchronization for<br /> the latter flows.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2024-26812

Publication date:
05/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vfio/pci: Create persistent INTx handler<br /> <br /> A vulnerability exists where the eventfd for INTx signaling can be<br /> deconfigured, which unregisters the IRQ handler but still allows<br /> eventfds to be signaled with a NULL context through the SET_IRQS ioctl<br /> or through unmask irqfd if the device interrupt is pending.<br /> <br /> Ideally this could be solved with some additional locking; the igate<br /> mutex serializes the ioctl and config space accesses, and the interrupt<br /> handler is unregistered relative to the trigger, but the irqfd path<br /> runs asynchronous to those. The igate mutex cannot be acquired from the<br /> atomic context of the eventfd wake function. Disabling the irqfd<br /> relative to the eventfd registration is potentially incompatible with<br /> existing userspace.<br /> <br /> As a result, the solution implemented here moves configuration of the<br /> INTx interrupt handler to track the lifetime of the INTx context object<br /> and irq_type configuration, rather than registration of a particular<br /> trigger eventfd. Synchronization is added between the ioctl path and<br /> eventfd_signal() wrapper such that the eventfd trigger can be<br /> dynamically updated relative to in-flight interrupts or irqfd callbacks.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2024-27437

Publication date:
05/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vfio/pci: Disable auto-enable of exclusive INTx IRQ<br /> <br /> Currently for devices requiring masking at the irqchip for INTx, ie.<br /> devices without DisINTx support, the IRQ is enabled in request_irq()<br /> and subsequently disabled as necessary to align with the masked status<br /> flag. This presents a window where the interrupt could fire between<br /> these events, resulting in the IRQ incrementing the disable depth twice.<br /> This would be unrecoverable for a user since the masked flag prevents<br /> nested enables through vfio.<br /> <br /> Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx<br /> is never auto-enabled, then unmask as required.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2024-30849

Publication date:
05/04/2024
Arbitrary file upload vulnerability in Sourcecodester Complete E-Commerce Site v1.0, allows remote attackers to execute arbitrary code via filename parameter in admin/products_photo.php.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2024-30891

Publication date:
05/04/2024
A command injection vulnerability exists in /goform/exeCommand in Tenda AC18 v15.03.05.05, which allows attackers to construct cmdinput parameters for arbitrary command execution.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-2115

Publication date:
05/04/2024
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.0.0. This is due to missing or incorrect nonce validation on the filter_users functions. This makes it possible for unauthenticated attackers to elevate their privileges to that of a teacher via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2024-3217

Publication date:
05/04/2024
The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the &amp;#39;attribute_value&amp;#39; and &amp;#39;attribute_id&amp;#39; parameters in all versions up to, and including, 1.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2024-29863

Publication date:
05/04/2024
A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR3 (12.70.20300) and May 2023 SR2 (12,80.20200) may allow an existing lower privileged user to cause code to be executed in the context of a Windows Administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-26329

Publication date:
05/04/2024
Chilkat before v9.5.0.98, allows attackers to obtain sensitive information via predictable PRNG in ChilkatRand::randomBytes function.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026