Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-6319

Publication date:
09/04/2024
A command injection vulnerability exists in the getAudioMetadata method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.<br /> <br /> * webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA <br /> <br /> * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA <br /> <br /> * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB <br /> <br /> * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-28234

Publication date:
09/04/2024
Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2023-6318

Publication date:
09/04/2024
A command injection vulnerability exists in the processAnalyticsReport method from the com.webos.service.cloudupload service on webOS version 5 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.<br /> <br /> Full versions and TV models affected:<br /> <br /> * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA <br /> <br /> * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB <br /> <br /> * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2023-6317

Publication date:
09/04/2024
A prompt bypass exists in the secondscreen.gateway service running on webOS version 4 through 7. An attacker can create a privileged account without asking the user for the security PIN. <br /> <br /> Full versions and TV models affected:<br /> <br /> webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA <br /> webOS 5.5.0 - 04.50.51 running on OLED55CXPUA <br /> webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB  <br /> webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-2224

Publication date:
09/04/2024
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects the following products that include the vulnerable component: <br /> <br /> Bitdefender Endpoint Security for Linux version 7.0.5.200089<br /> Bitdefender Endpoint Security for Windows version 7.9.9.380<br /> GravityZone Control Center (On Premises) version 6.36.1<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-2223

Publication date:
09/04/2024
An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component: <br /> <br /> Bitdefender Endpoint Security for Linux version 7.0.5.200089<br /> Bitdefender Endpoint Security for  Windows version 7.9.9.380<br /> GravityZone Control Center (On Premises) version 6.36.1<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-31544

Publication date:
09/04/2024
A stored cross-site scripting (XSS) vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary JavaScript code by including malicious payloads into “remarks”, “borrower_name”, “faculty_department” parameters in /classes/Master.php?f=save_record.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2024-31863

Publication date:
09/04/2024
Authentication Bypass by Spoofing vulnerability by replacing to exsiting notes in Apache Zeppelin.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0.<br /> <br /> Users are recommended to upgrade to version 0.11.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-3046

Publication date:
09/04/2024
In Eclipse Kura LogServlet component included in versions 5.0.0 to 5.4.1, a specifically crafted request to the servlet can allow an unauthenticated user to retrieve the device logs. Also, downloaded logs may be used by an attacker to perform privilege escalation by using the session id of an authenticated user reported in logs.<br /> <br /> This issue affects org.eclipse.kura:org.eclipse.kura.web2 version range [2.0.600, 2.4.0], which is included in Eclipse Kura version range [5.0.0, 5.4.1]<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2024-31862

Publication date:
09/04/2024
Improper Input Validation vulnerability in Apache Zeppelin when creating a new note from Zeppelin&amp;#39;s UI.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0.<br /> <br /> Users are recommended to upgrade to version 0.11.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-47894

Publication date:
09/04/2024
Improper Input Validation vulnerability in Apache Zeppelin SAP.This issue affects Apache Zeppelin SAP: from 0.8.0 before 0.11.0.<br /> <br /> As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.<br /> <br /> For more information, the fix already was merged in the source code but Zeppelin decided to retire the SAP component<br /> NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2021-28656

Publication date:
09/04/2024
Cross-Site Request Forgery (CSRF) vulnerability in Credential page of Apache Zeppelin allows an attacker to submit malicious request. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025