Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-11070

Publication date:
11/11/2024
A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
12/11/2024

CVE-2024-50263

Publication date:
11/11/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fork: only invoke khugepaged, ksm hooks if no error<br /> <br /> There is no reason to invoke these hooks early against an mm that is in an<br /> incomplete state.<br /> <br /> The change in commit d24062914837 ("fork: use __mt_dup() to duplicate<br /> maple tree in dup_mmap()") makes this more pertinent as we may be in a<br /> state where entries in the maple tree are not yet consistent.<br /> <br /> Their placement early in dup_mmap() only appears to have been meaningful<br /> for early error checking, and since functionally it&amp;#39;d require a very small<br /> allocation to fail (in practice &amp;#39;too small to fail&amp;#39;) that&amp;#39;d only occur in<br /> the most dire circumstances, meaning the fork would fail or be OOM&amp;#39;d in<br /> any case.<br /> <br /> Since both khugepaged and KSM tracking are there to provide optimisations<br /> to memory performance rather than critical functionality, it doesn&amp;#39;t<br /> really matter all that much if, under such dire memory pressure, we fail<br /> to register an mm with these.<br /> <br /> As a result, we follow the example of commit d2081b2bf819 ("mm:<br /> khugepaged: make khugepaged_enter() void function") and make ksm_fork() a<br /> void function also.<br /> <br /> We only expose the mm to these functions once we are done with them and<br /> only if no error occurred in the fork operation.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2024-10314

Publication date:
11/11/2024
In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the auto-generation function was identified. Reported by Karol Wi?sek.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2024

CVE-2024-10344

Publication date:
11/11/2024
In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the refuse function was identified. Reported by Karol Wi?sek.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2024

CVE-2024-10345

Publication date:
11/11/2024
In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. Reported by Karol Wi?sek.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2024

CVE-2024-34014

Publication date:
11/11/2024
Arbitrary file overwrite during recovery due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel &amp; WHM (Linux) before build 1.8.3.818, Acronis Backup plugin for cPanel &amp; WHM (Linux) before build 1.9.1.892, Acronis Backup extension for Plesk (Linux) before build 1.8.6.599, Acronis Backup plugin for DirectAdmin (Linux) before build 1.2.2.181.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2025

CVE-2024-34015

Publication date:
11/11/2024
Sensitive information disclosure during file browsing due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel &amp; WHM (Linux) before build 1.8.3.818, Acronis Backup plugin for cPanel &amp; WHM (Linux) before build 1.9.1.892.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2025

CVE-2024-43430

Publication date:
11/11/2024
A flaw was found in moodle. External API access to Quiz can override contained insufficient access control.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43432

Publication date:
11/11/2024
A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43433

Publication date:
11/11/2024
A flaw was found in moodle. Matrix room membership and power levels are incorrectly applied and revoked for suspended Moodle users.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43435

Publication date:
11/11/2024
A flaw was found in moodle. Insufficient capability checks make it possible for users with access to restore glossaries in courses to restore them into the global site glossary.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43437

Publication date:
11/11/2024
A flaw was found in moodle. Insufficient sanitizing of data when performing a restore could result in a cross-site scripting (XSS) risk from malicious backup files.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025