Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-13102

Publication date:
02/01/2025
A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This vulnerability affects unknown code of the file /goform/DDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
02/05/2025

CVE-2024-13103

Publication date:
02/01/2025
A vulnerability, which was classified as critical, has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This issue affects some unknown processing of the file /goform/form2AddVrtsrv.cgi of the component Virtual Service Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
02/05/2025

CVE-2024-56019

Publication date:
02/01/2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gavin Rehkemper Inline Footnotes allows Stored XSS.This issue affects Inline Footnotes: from n/a through 2.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2024-13093

Publication date:
02/01/2025
A vulnerability, which was classified as critical, has been found in code-projects Job Recruitment 1.0. This issue affects some unknown processing of the file /_parse/_call_main_search_ajax.php of the component Seeker Profile Handler. The manipulation of the argument s1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/04/2025

CVE-2024-12912

Publication date:
02/01/2025
An improper input insertion vulnerability in AiCloud on certain router models may lead to arbitrary command execution.<br /> Refer to the &amp;#39;01/02/2025 ASUS Router AiCloud vulnerability&amp;#39; section on the ASUS Security Advisory for more information.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2024-13092

Publication date:
02/01/2025
A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. This vulnerability affects unknown code of the file /_parse/_call_job/search_ajax.php of the component Job Post Handler. The manipulation of the argument n leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/04/2025

CVE-2024-11357

Publication date:
02/01/2025
The goodlayers-core WordPress plugin before 2.0.10 does not sanitise and escape some of its settings, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025

CVE-2024-12595

Publication date:
02/01/2025
The AHAthat Plugin WordPress plugin through 1.6 does not escape the $_SERVER[&amp;#39;REQUEST_URI&amp;#39;] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2024-11184

Publication date:
02/01/2025
The wp-enable-svg WordPress plugin through 0.7 does not sanitize SVG files when uploaded, allowing for authors and above to upload SVGs containing malicious scripts
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2024-56830

Publication date:
02/01/2025
The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl&amp;#39;s builtin rand() if no strong randomization module is present.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2002-20002

Publication date:
02/01/2025
The Net::EasyTCP package before 0.15 for Perl always uses Perl&amp;#39;s builtin rand(), which is not a strong random number generator, for cryptographic keys.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2025-22214

Publication date:
02/01/2025
Landray EIS 2001 through 2006 allows Message/fi_message_receiver.aspx?replyid= SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025