Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-6785

Publication date:
13/03/2024
The Download Manager plugin for WordPress is vulnerable to unauthorized file download of files added via the plugin in all versions up to, and including, 3.2.84. This makes it possible for unauthenticated attackers to download files added with the plugin (even when privately published).
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2025

CVE-2023-6809

Publication date:
13/03/2024
The Custom fields shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's cf shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied custom post meta values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2023-6825

Publication date:
13/03/2024
The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The free version requires Administrator access for this vulnerability to be exploitable. The Pro version allows a file manager to be embedded via a shortcode and also allows admins to grant file handling privileges to other user levels, which could lead to this vulnerability being exploited by lower-level users.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-27441

Publication date:
13/03/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2024

CVE-2024-25154

Publication date:
13/03/2024
Improper URL validation leads to path traversal in FileCatalyst Direct 3.8.8 and earlier allowing an encoded payload to cause the web server to return files located outside of the web root which may lead to data leakage.  
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-25155

Publication date:
13/03/2024
In FileCatalyst Direct 3.8.8 and earlier through 3.8.6, the web server does not properly sanitize illegal characters in a URL which is then displayed on a subsequent error page. A malicious actor could craft a URL which would then execute arbitrary code within an HTML script tag. 
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-25153

Publication date:
13/03/2024
A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2023-52608

Publication date:
13/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> firmware: arm_scmi: Check mailbox/SMT channel for consistency<br /> <br /> On reception of a completion interrupt the shared memory area is accessed<br /> to retrieve the message header at first and then, if the message sequence<br /> number identifies a transaction which is still pending, the related<br /> payload is fetched too.<br /> <br /> When an SCMI command times out the channel ownership remains with the<br /> platform until eventually a late reply is received and, as a consequence,<br /> any further transmission attempt remains pending, waiting for the channel<br /> to be relinquished by the platform.<br /> <br /> Once that late reply is received the channel ownership is given back<br /> to the agent and any pending request is then allowed to proceed and<br /> overwrite the SMT area of the just delivered late reply; then the wait<br /> for the reply to the new request starts.<br /> <br /> It has been observed that the spurious IRQ related to the late reply can<br /> be wrongly associated with the freshly enqueued request: when that happens<br /> the SCMI stack in-flight lookup procedure is fooled by the fact that the<br /> message header now present in the SMT area is related to the new pending<br /> transaction, even though the real reply has still to arrive.<br /> <br /> This race-condition on the A2P channel can be detected by looking at the<br /> channel status bits: a genuine reply from the platform will have set the<br /> channel free bit before triggering the completion IRQ.<br /> <br /> Add a consistency check to validate such condition in the A2P ISR.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2025

CVE-2024-1507

Publication date:
13/03/2024
The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &amp;#39;title_tags&amp;#39; attribute of the Rubix widget in all versions up to, and including, 3.13.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-1508

Publication date:
13/03/2024
The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &amp;#39;settings[&amp;#39;title_tags&amp;#39;]&amp;#39; attribute of the Mercury widget in all versions up to, and including, 3.13.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-28675

Publication date:
13/03/2024
DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /dede/diy_edit.php
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2024-28684

Publication date:
13/03/2024
DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via the component /dede/module_main.php
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025