Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-29055

Publication date:
29/01/2024
In Apache Kylin version 2.0.0 to 4.0.3, there is a Server Config web interface that displays the content of file &amp;#39;kylin.properties&amp;#39;, that may contain serverside credentials. When the kylin service runs over HTTP (or other plain text protocol), it is possible for network sniffers to hijack the HTTP payload and get access to the content of kylin.properties and potentially the containing credentials.<br /> <br /> To avoid this threat, users are recommended to <br /> <br /> * Always turn on HTTPS so that network payload is encrypted.<br /> <br /> * Avoid putting credentials in kylin.properties, or at least not in plain text.<br /> * Use network firewalls to protect the serverside such that it is not accessible to external attackers.<br /> <br /> * Upgrade to version Apache Kylin 4.0.4, which filters out the sensitive content that goes to the Server Config web interface.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-5378

Publication date:
29/01/2024
Improper Input Validation vulnerability in MegaBIP and already unsupported SmodBIP software allows for Stored XSS.This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2. MegaBIP 5.08 was tested and is not vulnerable. A precise range of vulnerable versions remains unknown.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2023-46838

Publication date:
29/01/2024
Transmit requests in Xen&amp;#39;s virtual network protocol can consist of<br /> multiple parts. While not really useful, except for the initial part<br /> any of them may be of zero length, i.e. carry no data at all. Besides a<br /> certain initial portion of the to be transferred data, these parts are<br /> directly translated into what Linux calls SKB fragments. Such converted<br /> request parts can, when for a particular SKB they are all of length<br /> zero, lead to a de-reference of NULL in core networking code.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-0212

Publication date:
29/01/2024
The Cloudflare Wordpress plugin was found to be vulnerable to improper authentication. The vulnerability enables attackers with a lower privileged account to access data from the Cloudflare API.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2024-23790

Publication date:
29/01/2024
Improper Input Validation vulnerability in the upload functionality for user avatars allows functionality misuse due to missing check of filetypes.<br /> This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023 through 2023.1.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2024-23791

Publication date:
29/01/2024
Insertion of debug information into log file during building the elastic search index allows reading of sensitive information from articles.This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2024-23792

Publication date:
29/01/2024
When adding attachments to ticket comments, <br /> another user can add attachments as well impersonating the orginal user. The attack requires a <br /> logged-in other user to know the UUID. While the legitimate user <br /> completes the comment, the malicious user can add more files to the <br /> comment.<br /> <br /> This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2023-45932

Publication date:
29/01/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2024

CVE-2023-46050

Publication date:
29/01/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2024

CVE-2023-45916

Publication date:
29/01/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2024

CVE-2023-45921

Publication date:
29/01/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2024

CVE-2024-24736

Publication date:
29/01/2024
The POP3 service in YahooPOPs (aka YPOPs!) 1.6 allows a remote denial of service (reboot) via a long string to TCP port 110, a related issue to CVE-2004-1558.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025