Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-9025

Publication date:
26/09/2024
The Sight – Professional Image Gallery and Portfolio plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'handler_post_title' function in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to expose private, pending, trashed, and draft post titles. Successful exploitation requires the Elementor plugin to be installed and activated.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2024-47044

Publication date:
26/09/2024
Multiple Home GateWay/Hikari Denwa routers provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION are vulnerable to insufficient access restrictions for Device Setting pages. If this vulnerability is exploited, an attacker who identified WAN-side IPv6 address may access the product's Device Setting page via WAN-side. Note that, the same products are also provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION, but the vulnerability only affects products subscribed and used in NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION areas.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024

CVE-2024-47337

Publication date:
26/09/2024
Missing Authorization vulnerability in Stuart Wilson Joy Of Text Lite.This issue affects Joy Of Text Lite: from n/a through 2.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-45843

Publication date:
26/09/2024
Mattermost versions 9.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-47003

Publication date:
26/09/2024
Mattermost versions 9.11.x
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-47145

Publication date:
26/09/2024
Mattermost versions 9.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-47197

Publication date:
26/09/2024
Exposure of Sensitive Information to an Unauthorized Actor, Insecure Storage of Sensitive Information vulnerability in Maven Archetype Plugin.<br /> <br /> This issue affects Maven Archetype Plugin: from 3.2.1 before 3.3.0.<br /> <br /> Users are recommended to upgrade to version 3.3.0, which fixes the issue.<br /> <br /> Archetype integration testing creates a file<br /> called ./target/classes/archetype-it/archetype-settings.xml<br /> This file contains all the content from the users ~/.m2/settings.xml file,<br /> which often contains information they do not want to publish. We expect that on many developer machines, this also contains<br /> credentials.<br /> <br /> When the user runs mvn verify again (without a mvn clean), this file becomes part of<br /> the final artifact.<br /> <br /> If a developer were to publish this into Maven Central or any other remote repository (whether as a release<br /> or a snapshot) their credentials would be published without them knowing.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-8861

Publication date:
26/09/2024
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.9.3.2 due to incorrect use of the wp_kses_allowed_html function, which allows the &amp;#39;onclick&amp;#39; attribute for certain HTML elements without sufficient restriction or context validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2024-42406

Publication date:
26/09/2024
Mattermost versions 9.11.x
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2024-4278

Publication date:
26/09/2024
An information disclosure issue has been discovered in GitLab EE affecting all versions starting from 16.5 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. A maintainer could obtain a Dependency Proxy password by editing a certain Dependency Proxy setting.
Severity CVSS v4.0: Pending analysis
Last modification:
08/10/2024

CVE-2024-0133

Publication date:
26/09/2024
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-6517

Publication date:
26/09/2024
The Contact Form 7 Math Captcha WordPress plugin through 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025