Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-47761

Publication date:
11/12/2024
GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an administrator with access to the sent notifications contents can take control of an account with higher privileges. Version 10.0.17 contains a patch for this issue.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2025

CVE-2024-10251

Publication date:
11/12/2024
Under specific circumstances, insecure permissions in Ivanti Security Controls before version 2024.4.1 allows a local authenticated attacker to achieve local privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
13/12/2024

CVE-2024-11597

Publication date:
11/12/2024
Under specific circumstances, insecure permissions in Ivanti Performance Manager before version 2024.3 HF1, 2024.1 HF1, or 2023.3 HF1 allows a local authenticated attacker to achieve local privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-11598

Publication date:
11/12/2024
Under specific circumstances, insecure permissions in Ivanti Application Control before version 2024.3 HF1, 2024.1 HF2, or 2023.3 HF3 allows a local authenticated attacker to achieve local privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-53677

Publication date:
11/12/2024
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.<br /> <br /> This issue affects Apache Struts: from 2.0.0 before 6.4.0.<br /> <br /> Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.<br /> <br /> You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
Severity CVSS v4.0: CRITICAL
Last modification:
15/07/2025

CVE-2024-47758

Publication date:
11/12/2024
GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch for this issue.
Severity CVSS v4.0: HIGH
Last modification:
06/02/2025

CVE-2024-28140

Publication date:
11/12/2024
The scanner device boots into a kiosk mode by default and opens the Scan2Net interface in a browser window. This browser is run with the permissions of the root user. There are also several other applications running as root user. This can be confirmed by running "ps aux" as the root user and observing the output.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-28141

Publication date:
11/12/2024
The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-28139

Publication date:
11/12/2024
The www-data user can elevate its privileges because sudo is configured to allow the execution of the mount command as root without a password. Therefore, the privileges can be escalated to the root user. The risk has been accepted by the vendor and won&amp;#39;t be fixed in the near future.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-50585

Publication date:
11/12/2024
Users who click on a malicious link or visit a website under the control of an attacker can be infected with arbitrary JavaScript which is running in the context of the "Numerix License Server Administration System Login" (nlslogin.jsp) page. The vulnerability can be triggered by sending a specially crafted HTTP POST request. <br /> <br /> <br /> <br /> The vendor was unresponsive during multiple attempts to contact them via various channels, hence there is no solution available. In case you are using this software, be sure to restrict access and monitor logs. Try to reach out to your contact person for this vendor and request a patch.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-51460

Publication date:
11/12/2024
IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2024-11351

Publication date:
11/12/2024
The Restrict – membership, site, content and user access restrictions for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.8 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026