Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-25126

Publication date:
29/02/2024
Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2024-26141

Publication date:
29/02/2024
Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2024-26146

Publication date:
29/02/2024
Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2024-21798

Publication date:
28/02/2024
ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2024-22532

Publication date:
28/02/2024
Buffer Overflow vulnerability in XNSoft NConvert 7.163 (for Windows x86) allows attackers to cause a denial of service via crafted xwd file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2025

CVE-2024-23910

Publication date:
28/02/2024
Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2024-25422

Publication date:
28/02/2024
SQL Injection vulnerability in SEMCMS v.4.8 allows a remote attacker to execute arbitrary code and obtain sensitive information via the SEMCMS_Menu.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2025

CVE-2024-25579

Publication date:
28/02/2024
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2024

CVE-2024-26559

Publication date:
28/02/2024
An issue in uverif v.2.0 allows a remote attacker to obtain sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2025

CVE-2023-5617

Publication date:
28/02/2024
<br /> Hitachi Vantara Pentaho Data Integration &amp; Analytics versions before 10.1.0.0 and 9.3.0.6, including 9.5.x and 8.3.x, display the version of Tomcat when a server error is encountered.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2023-45859

Publication date:
28/02/2024
In Hazelcast through 4.1.10, 4.2 through 4.2.8, 5.0 through 5.0.5, 5.1 through 5.1.7, 5.2 through 5.2.4, and 5.3 through 5.3.2, some client operations don&amp;#39;t check permissions properly, allowing authenticated users to access data stored in the cluster.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2025

CVE-2023-45873

Publication date:
28/02/2024
An issue was discovered in Couchbase Server through 7.2.2. A data reader may cause a denial of service (application exist) because of the OOM killer.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025