Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-42145

Publication date:
24/01/2024
An assertion failure discovered in in check_certificate_request() in Contiki-NG tinyDTLS through master branch 53a0d97 allows attackers to cause a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2021-42146

Publication date:
24/01/2024
An issue was discovered in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers allow remote attackers to reuse the same epoch number within two times the TCP maximum segment lifetime, which is prohibited in RFC6347. This vulnerability allows remote attackers to obtain sensitive application (data of connected clients).
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2021-42147

Publication date:
24/01/2024
Buffer over-read vulnerability in the dtls_sha256_update function in Contiki-NG tinyDTLS through master branch 53a0d97 allows remote attackers to cause a denial of service via crafted data packet.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-23649

Publication date:
24/01/2024
Lemmy is a link aggregator and forum for the fediverse. Starting in version 0.17.0 and prior to version 0.19.1, users can report private messages, even when they&amp;#39;re neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they&amp;#39;re able to see the resulting reports.<br /> <br /> Creating a private message report by POSTing to `/api/v3/private_message/report` does not validate whether the reporter is the recipient of the message. lemmy-ui does not allow the sender to report the message; the API method should likely be restricted to accessible to recipients only. The API response when creating a report contains the `private_message_report_view` with all the details of the report, including the private message that has been reported:<br /> <br /> Any authenticated user can obtain arbitrary (untargeted) private message contents. Privileges required depend on the instance configuration; when registrations are enabled without application system, the privileges required are practically none. When registration applications are required, privileges required could be considered low, but this assessment heavily varies by instance.<br /> <br /> Version 0.19.1 contains a patch for this issue. A workaround is available. If an update to a fixed Lemmy version is not immediately possible, the API route can be blocked in the reverse proxy. This will prevent anyone from reporting private messages, but it will also prevent exploitation before the update has been applied.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2024

CVE-2024-23897

Publication date:
24/01/2024
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an &amp;#39;@&amp;#39; character followed by a file path in an argument with the file&amp;#39;s contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2024-23898

Publication date:
24/01/2024
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-23899

Publication date:
24/01/2024
Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an &amp;#39;@&amp;#39; character followed by a file path in an argument with the file&amp;#39;s contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-23900

Publication date:
24/01/2024
Jenkins Matrix Project Plugin 822.v01b_8c85d16d2 and earlier does not sanitize user-defined axis names of multi-configuration projects, allowing attackers with Item/Configure permission to create or replace any config.xml files on the Jenkins controller file system with content not controllable by the attackers.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2024-23901

Publication date:
24/01/2024
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier unconditionally discovers projects that are shared with the configured owner group, allowing attackers to configure and share a project, resulting in a crafted Pipeline being built by Jenkins during the next scan of the group.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-23902

Publication date:
24/01/2024
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier allows attackers to connect to an attacker-specified URL.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-23903

Publication date:
24/01/2024
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2024-23904

Publication date:
24/01/2024
Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an &amp;#39;@&amp;#39; character followed by a file path in an argument with the file&amp;#39;s contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025