Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-24259

Publication date:
05/02/2024
freeglut through 3.4.0 was discovered to contain a memory leak via the menuEntry variable in the glutAddMenuEntry function.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-6028

Publication date:
05/02/2024
A reflected<br /> cross-site scripting (XSS) vulnerability exists in the SVG version of System<br /> Diagnostics Manager of B&amp;R Automation Runtime versions
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024

CVE-2023-6874

Publication date:
05/02/2024
Prior to v7.4.0, Ember ZNet is vulnerable to a denial of service attack through manipulation of the NWK sequence number
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2024-0953

Publication date:
05/02/2024
When a user scans a QR Code with the QR Code Scanner feature, the user is not prompted before being navigated to the page specified in the code. This may surprise the user and potentially direct them to unwanted content. This vulnerability affects Firefox for iOS
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2024

CVE-2024-23054

Publication date:
05/02/2024
An issue in Plone Docker Official Image 5.2.13 (5221) open-source software that could allow for remote code execution due to a package listed in ++plone++static/components not existing in the public package index (npm).
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-24397

Publication date:
05/02/2024
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2024-24468

Publication date:
05/02/2024
Cross Site Request Forgery vulnerability in flusity-CMS v.2.33 allows a remote attacker to execute arbitrary code via the add_customblock.php.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2024-24469

Publication date:
05/02/2024
Cross Site Request Forgery vulnerability in flusity-CMS v.2.33 allows a remote attacker to execute arbitrary code via the delete_post .php.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2023-47355

Publication date:
05/02/2024
The com.eypcnnapps.quickreboot (aka Eyuep Can Yilmaz {ROOT] Quick Reboot) application 1.0.8 for Android has exposed broadcast receivers for PowerOff, Reboot, and Recovery (e.g., com.eypcnnapps.quickreboot.widget.PowerOff) that are susceptible to unauthorized broadcasts because of missing input validation.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-0323

Publication date:
05/02/2024
The FTP server used on the B&amp;R<br /> Automation Runtime supports unsecure encryption mechanisms, such as SSLv3,<br /> TLSv1.0 and TLS1.1. An network-based attacker can exploit the flaws to conduct<br /> man-in-the-middle attacks or to decrypt communications between the affected product<br /> clients.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2024

CVE-2024-24762

Publication date:
05/02/2024
`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can&amp;#39;t handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2024-24768

Publication date:
05/02/2024
1Panel is an open source Linux server operation and maintenance management panel. The HTTPS cookie that comes with the panel does not have the Secure keyword, which may cause the cookie to be sent in plain text if accessed using HTTP. This issue has been patched in version 1.9.6.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2024