Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-49100

Publication date:
21/02/2024
Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdei_interrupt_bind. The parameter is passed to a call to plat_ic_get_interrupt_type. It can be any arbitrary value passing checks in the function plat_ic_is_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2024-1474

Publication date:
21/02/2024
In WS_FTP Server versions before 8.8.5, reflected cross-site scripting issues have been identified on various user supplied inputs on the WS_FTP Server administrative interface.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2024-1700

Publication date:
21/02/2024
A vulnerability, which was classified as problematic, was found in keerti1924 PHP-MYSQL-User-Login-System 1.0. Affected is an unknown function of the file /signup.php. The manipulation of the argument username with the input alert("xss") leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-22778

Publication date:
21/02/2024
HackMD CodiMD
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2024-26582

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: tls: fix use-after-free with partial reads and async decrypt<br /> <br /> tls_decrypt_sg doesn&amp;#39;t take a reference on the pages from clear_skb,<br /> so the put_page() in tls_decrypt_done releases them, and we trigger<br /> a use-after-free in process_rx_list when we try to read from the<br /> partially-read skb.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-26583

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: fix race between async notify and socket close<br /> <br /> The submitting thread (one which called recvmsg/sendmsg)<br /> may exit as soon as the async crypto handler calls complete()<br /> so any code past that point risks touching already freed data.<br /> <br /> Try to avoid the locking and extra flags altogether.<br /> Have the main thread hold an extra reference, this way<br /> we can depend solely on the atomic ref counter for<br /> synchronization.<br /> <br /> Don&amp;#39;t futz with reiniting the completion, either, we are now<br /> tightly controlling when completion fires.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-26584

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: tls: handle backlogging of crypto requests<br /> <br /> Since we&amp;#39;re setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our<br /> requests to the crypto API, crypto_aead_{encrypt,decrypt} can return<br /> -EBUSY instead of -EINPROGRESS in valid situations. For example, when<br /> the cryptd queue for AESNI is full (easy to trigger with an<br /> artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued<br /> to the backlog but still processed. In that case, the async callback<br /> will also be called twice: first with err == -EINPROGRESS, which it<br /> seems we can just ignore, then with err == 0.<br /> <br /> Compared to Sabrina&amp;#39;s original patch this version uses the new<br /> tls_*crypt_async_wait() helpers and converts the EBUSY to<br /> EINPROGRESS to avoid having to modify all the error handling<br /> paths. The handling is identical.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-26585

Publication date:
21/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: fix race between tx work scheduling and socket close<br /> <br /> Similarly to previous commit, the submitting thread (recvmsg/sendmsg)<br /> may exit as soon as the async crypto handler calls complete().<br /> Reorder scheduling the work before calling complete().<br /> This seems more logical in the first place, as it&amp;#39;s<br /> the inverse order of what the submitting thread will do.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-33843

Publication date:
21/02/2024
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 256544.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2024

CVE-2023-50955

Publication date:
21/02/2024
IBM InfoSphere Information Server 11.7 could allow an authenticated privileged user to obtain the absolute path of the web server installation which could aid in further attacks against the system. IBM X-Force ID: 275777.
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2024

CVE-2023-47795

Publication date:
21/02/2024
Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document&amp;#39;s “Title” text field.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2023-7235

Publication date:
21/02/2024
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025