Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-9170

Publication date:
26/11/2024
The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wcj_product_meta shortcode in all versions up to, and including, 7.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with ShopManager-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2018-11952

Publication date:
26/11/2024
An image with a version lower than the fuse version may potentially be booted lead to improper authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2024-11091

Publication date:
26/11/2024
The Support SVG – Upload svg files in wordpress without hassle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-11119

Publication date:
26/11/2024
The BNE Gallery Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gallery' shortcode in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-11192

Publication date:
26/11/2024
The Spotify Play Button for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's spotifyplaybutton shortcode in all versions up to, and including, 2.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2016-10394

Publication date:
26/11/2024
Initial xbl_sec revision does not have all the debug policy features and critical checks.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2017-11076

Publication date:
26/11/2024
On some hardware revisions where VP9 decoding is hardware-accelerated, the frame size is not programmed correctly into the decoder hardware which can lead to an invalid memory access by the decoder.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2017-15832

Publication date:
26/11/2024
Buffer overwrite in the WLAN host driver by leveraging a compromised WLAN FW
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2017-17772

Publication date:
26/11/2024
In multiple functions that process 802.11 frames, out-of-bounds reads can occur due to insufficient validation.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2017-18153

Publication date:
26/11/2024
A race condition exists in a driver potentially leading to a use-after-free condition.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2018-11922

Publication date:
26/11/2024
Wrong configuration in Touch Pal application can collect user behavior data without awareness by the user.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2024-8772

Publication date:
26/11/2024
51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API managedoverlayimages.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026