Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-0216

Publication date:
30/04/2024
The Google Doc Embedder plugin for WordPress is vulnerable to Server Side Request Forgery via the 'gview' shortcode in versions up to, and including, 2.6.4. This can allow authenticated attackers with contributor-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2024-4327

Publication date:
30/04/2024
A vulnerability was found in Apryse WebViewer up to 10.8.0. It has been classified as problematic. This affects an unknown part of the component PDF Document Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.9 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-262419. NOTE: The vendor was contacted early about this disclosure and explains that the documentation recommends a strict Content Security Policy and the issue was fixed in release 10.9.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2023-52724

Publication date:
30/04/2024
Open Networking Foundation SD-RAN onos-kpimon 0.4.7 allows out-of-bounds array access in the processIndicationFormat1 function.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2023-52725

Publication date:
30/04/2024
Open Networking Foundation SD-RAN ONOS onos-kpimon 0.4.7 allows blocking of the errCh channel within the Start function of the monitoring package.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2023-52726

Publication date:
30/04/2024
Open Networking Foundation SD-RAN ONOS onos-ric-sdk-go 0.8.12 allows infinite repetition of the processing of an error (in the Subscribe function implementation for the subscribed indication stream).
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2023-52727

Publication date:
30/04/2024
Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 allows an index out-of-range condition in parseAlignBits.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2023-52728

Publication date:
30/04/2024
Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 allows an index out-of-range condition in putBitString.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2024-34043

Publication date:
30/04/2024
O-RAN RICAPP kpimon-go I-Release has a segmentation violation via a certain E2AP-PDU message.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2024-34044

Publication date:
30/04/2024
The O-RAN E2T I-Release buildPrometheusList function can have a NULL pointer dereference because peerInfo can be NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2024

CVE-2024-34045

Publication date:
30/04/2024
The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment().
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-34046

Publication date:
30/04/2024
The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->sctpParams->e2tCounters[IN_SUCC][MSG_COUNTER][ProcedureCode_id_RICsubscription]->Increment().
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2024

CVE-2024-34047

Publication date:
30/04/2024
O-RAN RIC I-Release e2mgr lacks array size checks in RicServiceUpdateHandler.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025