Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-13247

Publication date:
09/01/2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Coffee allows Cross-Site Scripting (XSS).This issue affects Coffee: from 0.0.0 before 1.4.0.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13248

Publication date:
09/01/2025
Incorrect Privilege Assignment vulnerability in Drupal Private content allows Target Influence via Framing.This issue affects Private content: from 0.0.0 before 2.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13249

Publication date:
09/01/2025
Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 7.X-1.0 before 7.X-1.2.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13250

Publication date:
09/01/2025
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Drupal Symfony Mailer Lite allows Cross Site Request Forgery.This issue affects Drupal Symfony Mailer Lite: from 0.0.0 before 1.0.6.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13237

Publication date:
09/01/2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal File Entity (fieldable files) allows Cross-Site Scripting (XSS).This issue affects File Entity (fieldable files): from 7.X-* before 7.X-2.38.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13238

Publication date:
09/01/2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Typogrify allows Cross-Site Scripting (XSS).This issue affects Typogrify: from 0.0.0 before 1.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13239

Publication date:
09/01/2025
Weak Authentication vulnerability in Drupal Two-factor Authentication (TFA) allows Authentication Abuse.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.5.0.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13240

Publication date:
09/01/2025
Improper Access Control vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.05.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-13241

Publication date:
09/01/2025
Improper Authorization vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.0.5.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2025-21628

Publication date:
09/01/2025
Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2025

CVE-2025-22149

Publication date:
09/01/2025
JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value).
Severity CVSS v4.0: LOW
Last modification:
23/05/2025

CVE-2025-21602

Publication date:
09/01/2025
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). <br /> <br /> Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.<br /> <br /> This issue affects Junos OS: <br /> <br /> <br /> <br /> * from 21.4 before 21.4R3-S9, <br /> * from 22.2 before 22.2R3-S5, <br /> * from 22.3 before 22.3R3-S4,<br /> * from 22.4 before 22.4R3-S5, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S3, <br /> * from 24.2 before 24.2R1-S2, 24.2R2; <br /> <br /> <br /> This issue does not affect versions prior to 21.1R1.<br /> <br /> <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> <br /> <br /> * from 21.4 before 21.4R3-S9-EVO, <br /> * from 22.2 before 22.2R3-S5-EVO, <br /> * from 22.3 before 22.3R3-S4-EVO,<br /> * from 22.4 before 22.4R3-S5-EVO, <br /> * from 23.2 before 23.2R2-S3-EVO, <br /> * from 23.4 before 23.4R2-S3-EVO, <br /> * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.<br /> <br /> <br /> This issue does not affect versions prior to 21.1R1-EVO
Severity CVSS v4.0: HIGH
Last modification:
26/01/2026