Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-39674

Publication date:
25/07/2024
Plaintext vulnerability in the Gallery search module.<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/07/2024

CVE-2023-7271

Publication date:
25/07/2024
Privilege escalation vulnerability in the NMS module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/07/2024

CVE-2024-39670

Publication date:
25/07/2024
Privilege escalation vulnerability in the account synchronisation module.<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/07/2024

CVE-2024-39671

Publication date:
25/07/2024
Access control vulnerability in the security verification module.<br /> Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
26/07/2024

CVE-2024-6589

Publication date:
25/07/2024
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.2.6.8.2 via the &amp;#39;render_content_block_template&amp;#39; function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-37084

Publication date:
25/07/2024
In Spring Cloud Data Flow versions prior to 2.11.4,  a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-41705

Publication date:
25/07/2024
A stored XSS issue was discovered in Archer Platform 6.8 before 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14.P4 (6.14.0.4) and 6.13 P4 (6.13.0.4) are also fixed releases. This vulnerability is similar to, but not identical to, CVE-2023-30639.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-41706

Publication date:
25/07/2024
A stored XSS issue was discovered in Archer Platform 6 before version 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 P4 (6.14.0.4) is also a fixed release.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-41707

Publication date:
25/07/2024
An issue was discovered in Archer Platform 6 before 2024.06. Authenticated users can achieve HTML content injection. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-6972

Publication date:
25/07/2024
In affected versions of Octopus Server under certain circumstances it is possible for sensitive variables to be printed in the task log in clear-text.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2024-4811

Publication date:
25/07/2024
In affected versions of Octopus Server under certain conditions, a user with specific role assignments can access restricted project artifacts.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2024-7057

Publication date:
25/07/2024
An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where job artifacts can be inappropriately exposed to users lacking the proper authorization level.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024