Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-53130

Publication date:
04/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint<br /> <br /> When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty()<br /> may cause a NULL pointer dereference, or a general protection fault when<br /> KASAN is enabled.<br /> <br /> This happens because, since the tracepoint was added in<br /> mark_buffer_dirty(), it references the dev_t member bh-&gt;b_bdev-&gt;bd_dev<br /> regardless of whether the buffer head has a pointer to a block_device<br /> structure.<br /> <br /> In the current implementation, nilfs_grab_buffer(), which grabs a buffer<br /> to read (or create) a block of metadata, including b-tree node blocks,<br /> does not set the block device, but instead does so only if the buffer is<br /> not in the "uptodate" state for each of its caller block reading<br /> functions. However, if the uptodate flag is set on a folio/page, and the<br /> buffer heads are detached from it by try_to_free_buffers(), and new buffer<br /> heads are then attached by create_empty_buffers(), the uptodate flag may<br /> be restored to each buffer without the block device being set to<br /> bh-&gt;b_bdev, and mark_buffer_dirty() may be called later in that state,<br /> resulting in the bug mentioned above.<br /> <br /> Fix this issue by making nilfs_grab_buffer() always set the block device<br /> of the super block structure to the buffer head, regardless of the state<br /> of the buffer&amp;#39;s uptodate flag.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-40744

Publication date:
04/12/2024
Unrestricted file upload via security bypass in Convert Forms component for Joomla in versions before 4.4.8.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-40745

Publication date:
04/12/2024
Reflected Cross site scripting vulnerability in Convert Forms component for Joomla in versions before 4.4.8.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2024-12056

Publication date:
04/12/2024
The Client secret is not checked when using the OAuth Password grant type.<br /> <br /> By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.<br /> Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Severity CVSS v4.0: LOW
Last modification:
04/12/2024

CVE-2024-7488

Publication date:
04/12/2024
Integer Overflow or Wraparound, Improper Validation of Specified Quantity in Input vulnerability in RestApp Inc. Online Ordering System allows Integer Attacks.<br /> <br /> <br /> This issue affects Online Ordering System: 8.2.1. <br /> <br /> NOTE: Vulnerability fixed in version 8.2.2 and does not exist before 8.2.1.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2025

CVE-2024-51465

Publication date:
04/12/2024
IBM App Connect Enterprise Certified Container 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, and 12.3 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2025

CVE-2024-53125

Publication date:
04/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: sync_linked_regs() must preserve subreg_def<br /> <br /> Range propagation must not affect subreg_def marks, otherwise the<br /> following example is rewritten by verifier incorrectly when<br /> BPF_F_TEST_RND_HI32 flag is set:<br /> <br /> 0: call bpf_ktime_get_ns call bpf_ktime_get_ns<br /> 1: r0 &amp;= 0x7fffffff after verifier r0 &amp;= 0x7fffffff<br /> 2: w1 = w0 rewrites w1 = w0<br /> 3: if w0 r11 = 0x2f5674a6 (r)<br /> 4: r1 &gt;&gt;= 32 r11
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-12138

Publication date:
04/12/2024
A vulnerability classified as critical was found in horilla up to 1.2.1. This vulnerability affects the function request_new/get_employee_shift/create_reimbursement/key_result_current_value_update/create_meetings/create_skills. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
19/09/2025

CVE-2024-11935

Publication date:
04/12/2024
The Email Address Obfuscation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘class’ parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2024

CVE-2024-54154

Publication date:
04/12/2024
In JetBrains YouTrack before 2024.3.51866 system takeover was possible through path traversal in plugin sandbox
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2024-54155

Publication date:
04/12/2024
In JetBrains YouTrack before 2024.3.51866 improper access control allowed listing of project names during app import without authentication
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2024-54156

Publication date:
04/12/2024
In JetBrains YouTrack before 2024.3.52635 multiple merge functions were vulnerable to prototype pollution attack
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2025