Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-39328

Publication date:
09/07/2024
A vulnerability was found in OpenJPEG similar to CVE-2019-6988. This flaw allows an attacker to bypass existing protections and cause an application crash through a maliciously crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2025

CVE-2024-2177

Publication date:
09/07/2024
A Cross Window Forgery vulnerability exists within GitLab CE/EE affecting all versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. This condition allows for an attacker to abuse the OAuth authentication flow via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2024-37513

Publication date:
09/07/2024
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Themewinter WPCafe allows Path Traversal.This issue affects WPCafe: from n/a through 2.2.27.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2024

CVE-2024-37520

Publication date:
09/07/2024
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in RadiusTheme ShopBuilder – Elementor WooCommerce Builder Addons allows Path Traversal.This issue affects ShopBuilder – Elementor WooCommerce Builder Addons: from n/a through 2.1.12.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2024-37934

Publication date:
09/07/2024
Improper Control of Generation of Code ('Code Injection') vulnerability in Saturday Drive Ninja Forms allows Code Injection.This issue affects Ninja Forms: from n/a through 3.8.4.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2024-37952

Publication date:
09/07/2024
Improper Privilege Management vulnerability in themeenergy BookYourTravel allows Privilege Escalation.This issue affects BookYourTravel: from n/a through 8.18.17.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2024

CVE-2024-22271

Publication date:
09/07/2024
In Spring Cloud Function framework, versions 4.1.x prior to 4.1.2, 4.0.x prior to 4.0.8 an application is vulnerable to a DOS attack when attempting to compose functions with non-existing functions.<br /> <br /> Specifically, an application is vulnerable when all of the following are true:<br /> <br /> User is using Spring Cloud Function Web module<br /> <br /> Affected Spring Products and Versions Spring Cloud Function Framework 4.1.0 to 4.1.2 4.0.0 to 4.0.8<br /> <br /> References https://spring.io/security/cve-2022-22979   https://checkmarx.com/blog/spring-function-cloud-dos-cve-2022-22979-and-unintended-function-invocation/  History 2020-01-16: Initial vulnerability report published.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-6391

Publication date:
09/07/2024
The oik plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s bw_button shortcode in all versions up to, and including, 4.10.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2024

CVE-2024-39876

Publication date:
09/07/2024
A vulnerability has been identified in SINEMA Remote Connect Server (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-39888

Publication date:
09/07/2024
A vulnerability has been identified in Mendix Encryption (All versions &gt;= V10.0.0
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2024

CVE-2024-3596

Publication date:
09/07/2024
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-39872

Publication date:
09/07/2024
A vulnerability has been identified in SINEMA Remote Connect Server (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024