Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8861

Publication date:
26/09/2024
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.9.3.2 due to incorrect use of the wp_kses_allowed_html function, which allows the 'onclick' attribute for certain HTML elements without sufficient restriction or context validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2024-47197

Publication date:
26/09/2024
Exposure of Sensitive Information to an Unauthorized Actor, Insecure Storage of Sensitive Information vulnerability in Maven Archetype Plugin.<br /> <br /> This issue affects Maven Archetype Plugin: from 3.2.1 before 3.3.0.<br /> <br /> Users are recommended to upgrade to version 3.3.0, which fixes the issue.<br /> <br /> Archetype integration testing creates a file<br /> called ./target/classes/archetype-it/archetype-settings.xml<br /> This file contains all the content from the users ~/.m2/settings.xml file,<br /> which often contains information they do not want to publish. We expect that on many developer machines, this also contains<br /> credentials.<br /> <br /> When the user runs mvn verify again (without a mvn clean), this file becomes part of<br /> the final artifact.<br /> <br /> If a developer were to publish this into Maven Central or any other remote repository (whether as a release<br /> or a snapshot) their credentials would be published without them knowing.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-42406

Publication date:
26/09/2024
Mattermost versions 9.11.x
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2024-4278

Publication date:
26/09/2024
An information disclosure issue has been discovered in GitLab EE affecting all versions starting from 16.5 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. A maintainer could obtain a Dependency Proxy password by editing a certain Dependency Proxy setting.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2024-0133

Publication date:
26/09/2024
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-6517

Publication date:
26/09/2024
The Contact Form 7 Math Captcha WordPress plugin through 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2024-0132

Publication date:
26/09/2024
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-7772

Publication date:
26/09/2024
The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file uploads due to a mishandled file type validation in the &amp;#39;validate&amp;#39; function in all versions up to, and including, 4.6.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site&amp;#39;s server which may make remote code execution possible.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-7781

Publication date:
26/09/2024
The Jupiter X Core plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.7.5. This is due to improper authentication via the Social Login widget. This makes it possible for unauthenticated attackers to log in as the first user to have logged in with a social media account, including administrator accounts. Attackers can exploit the vulnerability even if the Social Login element has been disabled, as long as it was previously enabled and used. The vulnerability was partially patched in version 4.7.5, and fully patched in version 4.7.8.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-45372

Publication date:
26/09/2024
MZK-DP300N firmware versions 1.04 and earlier contains a cross-site request forger vulnerability. Viewing a malicious page while logging in to the web management page of the affected product may lead the user to perform unintended operations such as changing the login password, etc.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-45836

Publication date:
26/09/2024
Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-47045

Publication date:
26/09/2024
Privilege chaining issue exists in the installer of e-Tax software(common program). If this vulnerability is exploited, a malicious DLL prepared by an attacker may be executed with higher privileges than the application privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024