Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-32559

Publication date:
18/04/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in hwk-fr WP 404 Auto Redirect to Similar Post allows Reflected XSS.This issue affects WP 404 Auto Redirect to Similar Post: from n/a through 1.0.4.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-32560

Publication date:
18/04/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Sharabindu QR Code Composer allows Stored XSS.This issue affects QR Code Composer: from n/a through 2.0.3.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-32561

Publication date:
18/04/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Tagembed allows Stored XSS.This issue affects Tagembed: from n/a through 4.7.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-32562

Publication date:
18/04/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in VIICTORY MEDIA LLC Z Y N I T H allows Stored XSS.This issue affects Z Y N I T H: from n/a through 7.4.9.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-29003

Publication date:
18/04/2024
The SolarWinds Platform was susceptible to a XSS vulnerability that affects the maps section of the user interface. This vulnerability requires authentication and requires user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2025

CVE-2024-2833

Publication date:
18/04/2024
The Jobs for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘job-search’ parameter in all versions up to, and including, 2.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-32554

Publication date:
18/04/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Knight Lab Knight Lab Timeline allows Stored XSS.This issue affects Knight Lab Timeline: from n/a through 3.9.3.4.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-26921

Publication date:
18/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> inet: inet_defrag: prevent sk release while still in use<br /> <br /> ip_local_out() and other functions can pass skb-&gt;sk as function argument.<br /> <br /> If the skb is a fragment and reassembly happens before such function call<br /> returns, the sk must not be released.<br /> <br /> This affects skb fragments reassembled via netfilter or similar<br /> modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.<br /> <br /> Eric Dumazet made an initial analysis of this bug. Quoting Eric:<br /> Calling ip_defrag() in output path is also implying skb_orphan(),<br /> which is buggy because output path relies on sk not disappearing.<br /> <br /> A relevant old patch about the issue was :<br /> 8282f27449bf ("inet: frag: Always orphan skbs inside ip_defrag()")<br /> <br /> [..]<br /> <br /> net/ipv4/ip_output.c depends on skb-&gt;sk being set, and probably to an<br /> inet socket, not an arbitrary one.<br /> <br /> If we orphan the packet in ipvlan, then downstream things like FQ<br /> packet scheduler will not work properly.<br /> <br /> We need to change ip_defrag() to only use skb_orphan() when really<br /> needed, ie whenever frag_list is going to be used.<br /> <br /> Eric suggested to stash sk in fragment queue and made an initial patch.<br /> However there is a problem with this:<br /> <br /> If skb is refragmented again right after, ip_do_fragment() will copy<br /> head-&gt;sk to the new fragments, and sets up destructor to sock_wfree.<br /> IOW, we have no choice but to fix up sk_wmem accouting to reflect the<br /> fully reassembled skb, else wmem will underflow.<br /> <br /> This change moves the orphan down into the core, to last possible moment.<br /> As ip_defrag_offset is aliased with sk_buff-&gt;sk member, we must move the<br /> offset into the FRAG_CB, else skb-&gt;sk gets clobbered.<br /> <br /> This allows to delay the orphaning long enough to learn if the skb has<br /> to be queued or if the skb is completing the reasm queue.<br /> <br /> In the former case, things work as before, skb is orphaned. This is<br /> safe because skb gets queued/stolen and won&amp;#39;t continue past reasm engine.<br /> <br /> In the latter case, we will steal the skb-&gt;sk reference, reattach it to<br /> the head skb, and fix up wmem accouting when inet_frag inflates truesize.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-32601

Publication date:
18/04/2024
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Popup Anything.This issue affects Popup Anything: from n/a through 2.8.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-32604

Publication date:
18/04/2024
Authorization Bypass Through User-Controlled Key vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024

CVE-2024-32603

Publication date:
18/04/2024
Deserialization of Untrusted Data vulnerability in ThemeKraft WooBuddy.This issue affects WooBuddy: from n/a through 3.4.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2024-32596

Publication date:
18/04/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Eric-Oliver Mächler DSGVO Youtube allows Stored XSS.This issue affects DSGVO Youtube: from n/a through 1.4.5.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2024