Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-1701

Publication date:
21/02/2024
A vulnerability has been found in keerti1924 PHP-MYSQL-User-Login-System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254389 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-22220

Publication date:
21/02/2024
An issue was discovered in Terminalfour 7.4 through 7.4.0004 QP3 and 8 through 8.3.19, and Formbank through 2.1.10-FINAL. Unauthenticated Stored Cross-Site Scripting can occur, with resultant Admin Session Hijacking. The attack vectors are Form Builder and Form Preview.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2025

CVE-2022-45177

Publication date:
21/02/2024
An issue was discovered in LIVEBOX Collaboration vDesk through v031. An Observable Response Discrepancy can occur under the /api/v1/vdeskintegration/user/isenableuser endpoint, the /api/v1/sharedsearch?search={NAME]+{SURNAME] endpoint, and the /login endpoint. The web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-49100

Publication date:
21/02/2024
Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdei_interrupt_bind. The parameter is passed to a call to plat_ic_get_interrupt_type. It can be any arbitrary value passing checks in the function plat_ic_is_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2022-45169

Publication date:
21/02/2024
An issue was discovered in LIVEBOX Collaboration vDesk through v031. A URL Redirection to an Untrusted Site (Open Redirect) can occur under the /api/v1/notification/createnotification endpoint, allowing an authenticated user to send an arbitrary push notification to any other user of the system. This push notification can include an (invisible) clickable link.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2023-46241

Publication date:
21/02/2024
`discourse-microsoft-auth` is a plugin that enables authentication via Microsoft. On sites with the `discourse-microsoft-auth` plugin enabled, an attack can potentially take control of a victim&amp;#39;s Discourse account. Sites that have configured their application&amp;#39;s account type to any options other than `Accounts in this organizational directory only (O365 only - Single tenant)` are vulnerable. This vulnerability has been patched in commit c40665f44509724b64938c85def9fb2e79f62ec8 of `discourse-microsoft-auth`. A `microsoft_auth:revoke` rake task has also been added which will deactivate and log out all users that have connected their accounts to Microsoft. User API keys as well as API keys created by those users will also be revoked. The rake task will also remove the connection records to Microsoft for those users. This will allow affected users to re-verify their account emails as well as reconnect their Discourse account to Microsoft for authentication. As a workaround, disable the `discourse-microsoft-auth` plugin by setting the `microsoft_auth_enabled` site setting to `false`. Run the `microsoft_auth:log_out_users` rake task to log out all users with associated Microsoft accounts.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2024-1474

Publication date:
21/02/2024
In WS_FTP Server versions before 8.8.5, reflected cross-site scripting issues have been identified on various user supplied inputs on the WS_FTP Server administrative interface.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2022-45179

Publication date:
21/02/2024
An issue was discovered in LIVEBOX Collaboration vDesk through v031. A basic XSS vulnerability exists under the /api/v1/vdeskintegration/todo/createorupdate endpoint via the title parameter and /dashboard/reminders. A remote user (authenticated to the product) can store arbitrary HTML code in the reminder section title in order to corrupt the web page (for example, by creating phishing sections to exfiltrate victims&amp;#39; credentials).
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2024-1700

Publication date:
21/02/2024
A vulnerability, which was classified as problematic, was found in keerti1924 PHP-MYSQL-User-Login-System 1.0. Affected is an unknown function of the file /signup.php. The manipulation of the argument username with the input alert("xss") leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-26582

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: tls: fix use-after-free with partial reads and async decrypt<br /> <br /> tls_decrypt_sg doesn&amp;#39;t take a reference on the pages from clear_skb,<br /> so the put_page() in tls_decrypt_done releases them, and we trigger<br /> a use-after-free in process_rx_list when we try to read from the<br /> partially-read skb.
Severity CVSS v4.0: Pending analysis
Last modification:
15/03/2024

CVE-2024-26583

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: fix race between async notify and socket close<br /> <br /> The submitting thread (one which called recvmsg/sendmsg)<br /> may exit as soon as the async crypto handler calls complete()<br /> so any code past that point risks touching already freed data.<br /> <br /> Try to avoid the locking and extra flags altogether.<br /> Have the main thread hold an extra reference, this way<br /> we can depend solely on the atomic ref counter for<br /> synchronization.<br /> <br /> Don&amp;#39;t futz with reiniting the completion, either, we are now<br /> tightly controlling when completion fires.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2024

CVE-2024-26584

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: tls: handle backlogging of crypto requests<br /> <br /> Since we&amp;#39;re setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our<br /> requests to the crypto API, crypto_aead_{encrypt,decrypt} can return<br /> -EBUSY instead of -EINPROGRESS in valid situations. For example, when<br /> the cryptd queue for AESNI is full (easy to trigger with an<br /> artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued<br /> to the backlog but still processed. In that case, the async callback<br /> will also be called twice: first with err == -EINPROGRESS, which it<br /> seems we can just ignore, then with err == 0.<br /> <br /> Compared to Sabrina&amp;#39;s original patch this version uses the new<br /> tls_*crypt_async_wait() helpers and converts the EBUSY to<br /> EINPROGRESS to avoid having to modify all the error handling<br /> paths. The handling is identical.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2024