Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-8006

Publication date:
12/04/2024
The server in Circontrol Raption through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain run-time control of the device as root. The ocpp1.5 and pwrstudio binaries on the charging station do not use a number of common exploitation mitigations. In particular, there are no stack canaries and they do not use the Position Independent Executable (PIE) format.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-31372

Publication date:
12/04/2024
Cross-Site Request Forgery (CSRF) vulnerability in Arnan de Gans No-Bot Registration.This issue affects No-Bot Registration: from n/a through 1.9.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2024-3054

Publication date:
12/04/2024
WPvivid Backup &amp; Migration Plugin for WordPress is vulnerable to PHAR Deserialization in all versions up to, and including, 0.9.99 via deserialization of untrusted input at the wpvividstg_get_custom_exclude_path_free action. This is due to the plugin not providing sufficient path validation on the tree_node[node][id] parameter. This makes it possible for authenticated attackers, with admin-level access and above, to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2025

CVE-2024-3211

Publication date:
12/04/2024
The Shopping Cart &amp; eCommerce Store plugin for WordPress is vulnerable to SQL Injection via the &amp;#39;productid&amp;#39; attribute of the ec_addtocart shortcode in all versions up to, and including, 5.6.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
12/04/2024

CVE-2024-31371

Publication date:
12/04/2024
Cross-Site Request Forgery (CSRF) vulnerability in Xylus Themes WP Event Aggregator.This issue affects WP Event Aggregator: from n/a through 1.7.6.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2026

CVE-2024-3400

Publication date:
12/04/2024
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.<br /> <br /> Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-22526

Publication date:
12/04/2024
Buffer Overflow vulnerability in bandisoft bandiview v7.0, allows local attackers to cause a denial of service (DoS) via exr image file.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2024-27309

Publication date:
12/04/2024
While an Apache Kafka cluster is being migrated from ZooKeeper mode to KRaft mode, in some cases ACLs will not be correctly enforced.<br /> <br /> Two preconditions are needed to trigger the bug:<br /> 1. The administrator decides to remove an ACL<br /> 2. The resource associated with the removed ACL continues to have two or more other ACLs associated with it after the removal.<br /> <br /> When those two preconditions are met, Kafka will treat the resource as if it had only one ACL associated with it after the removal, rather than the two or more that would be correct.<br /> <br /> The incorrect condition is cleared by removing all brokers in ZK mode, or by adding a new ACL to the affected resource. Once the migration is completed, there is no metadata loss (the ACLs all remain).<br /> <br /> The full impact depends on the ACLs in use. If only ALLOW ACLs were configured during the migration, the impact would be limited to availability impact. if DENY ACLs were configured, the impact could include confidentiality and integrity impact depending on the ACLs configured, as the DENY ACLs might be ignored due to this vulnerability during the migration period.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2025

CVE-2024-29400

Publication date:
12/04/2024
An issue was discovered in RuoYi v4.5.1, allows attackers to obtain sensitive information via the status parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2025

CVE-2024-22734

Publication date:
12/04/2024
An issue was discovered in AMCS Group Trux Waste Management Software before version 7.19.0018.26912, allows local attackers to obtain sensitive information via a static, hard-coded AES Key-IV pair in the TxUtilities.dll and TruxUser.cfg components.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2024-30614

Publication date:
12/04/2024
An issue in Ametys CMS v4.5.0 and before allows attackers to obtain sensitive information via exposed resources to the error scope.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2023-49528

Publication date:
12/04/2024
Buffer Overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via the af_dialoguenhance.c:261:5 in the de_stereo component.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025