Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-13205

Publication date:
09/01/2025
A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/create_product.php of the component Create Product Page. The manipulation of the argument Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
02/07/2025

CVE-2024-13200

Publication date:
09/01/2025
A vulnerability, which was classified as critical, was found in wander-chu SpringBoot-Blog 1.0. This affects the function preHandle of the file src/main/java/com/my/blog/website/interceptor/BaseInterceptor.java of the component HTTP POST Request Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
09/01/2025

CVE-2024-13199

Publication date:
09/01/2025
A vulnerability classified as problematic was found in langhsu Mblog Blog System 3.5.0. Affected by this vulnerability is an unknown functionality of the file /search of the component Search Bar. The manipulation of the argument kw leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
09/01/2025

CVE-2024-27980

Publication date:
09/01/2025
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2024-37372

Publication date:
09/01/2025
The Permission Model assumes that any path starting with two backslashes \ has a four-character prefix that can be ignored, which is not always true. This subtle bug leads to vulnerable edge cases.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-23913

Publication date:
09/01/2025
There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-27539

Publication date:
09/01/2025
There is a denial of service vulnerability in the header parsing component of Rack.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2023-28120

Publication date:
09/01/2025
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2024-13198

Publication date:
09/01/2025
A vulnerability classified as problematic has been found in langhsu Mblog Blog System 3.5.0. Affected is an unknown function of the file /login. The manipulation leads to observable response discrepancy. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
09/01/2025

CVE-2023-38037

Publication date:
09/01/2025
ActiveSupport::EncryptedFile writes contents that will be encrypted to a<br /> temporary file. The temporary file&amp;#39;s permissions are defaulted to the user&amp;#39;s<br /> current `umask` settings, meaning that it&amp;#39;s possible for other users on the<br /> same system to read the contents of the temporary file.<br /> <br /> Attackers that have access to the file system could possibly read the contents<br /> of this temporary file while a user is editing it.<br /> <br /> All users running an affected release should either upgrade or use one of the<br /> workarounds immediately.
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2025

CVE-2023-28362

Publication date:
09/01/2025
The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-27531

Publication date:
09/01/2025
There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025