Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-26297

Publication date:
27/02/2024
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-26298

Publication date:
27/02/2024
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-26299

Publication date:
27/02/2024
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim&amp;#39;s browser in the context of the affected interface.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-26542

Publication date:
27/02/2024
Cross Site Scripting vulnerability in Bonitasoft, S.A v.7.14. and fixed in v.9.0.2, 8.0.3, 7.15.7, 7.14.8 allows attackers to execute arbitrary code via a crafted payload to the Groups Display name field.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2025

CVE-2024-0763

Publication date:
27/02/2024
Any user can delete an arbitrary folder (recursively) on a remote server due to bad input sanitization leading to path traversal. The attacker would need access to the server at some privilege level since this endpoint is protected and requires authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-1864

Publication date:
27/02/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2813. Reason: This candidate is a duplicate of CVE-2023-2813. Notes: All CVE users should reference CVE-2023-2813 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2024-1865

Publication date:
27/02/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2813. Reason: This candidate is a duplicate of CVE-2023-2813. Notes: All CVE users should reference CVE-2023-2813 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2024-1866

Publication date:
27/02/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2813. Reason: This candidate is a duplicate of CVE-2023-2813. Notes: All CVE users should reference CVE-2023-2813 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2024-26294

Publication date:
27/02/2024
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-24027

Publication date:
27/02/2024
SQL Injection vulnerability in Likeshop before 2.5.7 allows attackers to run abitrary SQL commands via the function DistributionMemberLogic::getFansLists.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2021-46963

Publication date:
27/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()<br /> <br /> RIP: 0010:kmem_cache_free+0xfa/0x1b0<br /> Call Trace:<br /> qla2xxx_mqueuecommand+0x2b5/0x2c0 [qla2xxx]<br /> scsi_queue_rq+0x5e2/0xa40<br /> __blk_mq_try_issue_directly+0x128/0x1d0<br /> blk_mq_request_issue_directly+0x4e/0xb0<br /> <br /> Fix incorrect call to free srb in qla2xxx_mqueuecommand(), as srb is now<br /> allocated by upper layers. This fixes smatch warning of srb unintended<br /> free.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2021-46964

Publication date:
27/02/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: Reserve extra IRQ vectors<br /> <br /> Commit a6dcfe08487e ("scsi: qla2xxx: Limit interrupt vectors to number of<br /> CPUs") lowers the number of allocated MSI-X vectors to the number of CPUs.<br /> <br /> That breaks vector allocation assumptions in qla83xx_iospace_config(),<br /> qla24xx_enable_msix() and qla2x00_iospace_config(). Either of the functions<br /> computes maximum number of qpairs as:<br /> <br /> ha-&gt;max_qpairs = ha-&gt;msix_count - 1 (MB interrupt) - 1 (default<br /> response queue) - 1 (ATIO, in dual or pure target mode)<br /> <br /> max_qpairs is set to zero in case of two CPUs and initiator mode. The<br /> number is then used to allocate ha-&gt;queue_pair_map inside<br /> qla2x00_alloc_queues(). No allocation happens and ha-&gt;queue_pair_map is<br /> left NULL but the driver thinks there are queue pairs available.<br /> <br /> qla2xxx_queuecommand() tries to find a qpair in the map and crashes:<br /> <br /> if (ha-&gt;mqenable) {<br /> uint32_t tag;<br /> uint16_t hwq;<br /> struct qla_qpair *qpair = NULL;<br /> <br /> tag = blk_mq_unique_tag(cmd-&gt;request);<br /> hwq = blk_mq_unique_tag_to_hwq(tag);<br /> qpair = ha-&gt;queue_pair_map[hwq]; #
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2025