Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-32945

Publication date:
15/07/2024
Mattermost Mobile Apps versions
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-39767

Publication date:
15/07/2024
Mattermost Mobile Apps versions
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6398

Publication date:
15/07/2024
An information disclosure vulnerability in SWG in versions 12.x prior to 12.2.10 and 11.x prior to 11.2.24 allows information stored in a customizable block page to be disclosed to third-party websites due to Same Origin Policy Bypass of browsers in certain scenarios. The risk is low, because other recommended default security policies such as URL categorization and GTI are in place in most policies to block access to uncategorized/high risk websites. Any information disclosed depends on how the customers have customized the block pages.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2024

CVE-2024-41007

Publication date:
15/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tcp: avoid too many retransmit packets<br /> <br /> If a TCP socket is using TCP_USER_TIMEOUT, and the other peer<br /> retracted its window to zero, tcp_retransmit_timer() can<br /> retransmit a packet every two jiffies (2 ms for HZ=1000),<br /> for about 4 minutes after TCP_USER_TIMEOUT has &amp;#39;expired&amp;#39;.<br /> <br /> The fix is to make sure tcp_rtx_probe0_timed_out() takes<br /> icsk-&gt;icsk_user_timeout into account.<br /> <br /> Before blamed commit, the socket would not timeout after<br /> icsk-&gt;icsk_user_timeout, but would use standard exponential<br /> backoff for the retransmits.<br /> <br /> Also worth noting that before commit e89688e3e978 ("net: tcp:<br /> fix unexcepted socket die when snd_wnd is 0"), the issue<br /> would last 2 minutes instead of 4.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-6740

Publication date:
15/07/2024
Openfind&amp;#39;s Mail2000 does not properly validate email atachments, allowing unauthenticated remote attackers to inject JavaScript code within the attachment and perform Stored Cross-site scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2023-41916

Publication date:
15/07/2024
<br /> In Apache Linkis =1.4.0, due to the lack of effective filtering<br /> of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will trigger arbitrary file reading. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis = 1.4.0 will be affected. <br /> We recommend users upgrade the version of Linkis to version 1.5.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2023-46801

Publication date:
15/07/2024
<br /> In Apache Linkis
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2023-49566

Publication date:
15/07/2024
<br /> In Apache Linkis
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-23794

Publication date:
15/07/2024
An incorrect privilege assignment vulnerability in the inline editing functionality of OTRS can lead to privilege escalation. This flaw allows an agent with read-only permissions to gain full access to a ticket. This issue arises in very rare instances when an admin has previously enabled the setting &amp;#39;RequiredLock&amp;#39; of &amp;#39;AgentFrontend::Ticket::InlineEditing::Property###Watch&amp;#39; in the system configuration.This issue affects OTRS: <br /> <br /> * 8.0.X<br /> * 2023.X<br /> * from 2024.X through 2024.4.x<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6540

Publication date:
15/07/2024
Improper filtering of fields when using the export function in the ticket overview of the external interface in OTRS could allow an authorized user to download a list of tickets containing information about tickets of other customers. The problem only occurs if the TicketSearchLegacyEngine has been disabled by the administrator.<br /> This issue affects OTRS: 8.0.X, 2023.X, from 2024.X through 2024.4.x<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6743

Publication date:
15/07/2024
AguardNet&amp;#39;s Space Management System does not properly validate user input, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024

CVE-2024-6744

Publication date:
15/07/2024
The SMTP Listener of Secure Email Gateway from Cellopoint does not properly validate user input, leading to a Buffer Overflow vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the remote server.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2024