Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-0325

Publication date:
01/02/2024
In Helix Sync versions prior to 2024.1, a local command injection was identified. Reported by Bryan Riggins.  <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024

CVE-2024-1039

Publication date:
01/02/2024
Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025

CVE-2024-1040

Publication date:
01/02/2024
Gessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025

CVE-2024-24755

Publication date:
01/02/2024
discourse-group-membership-ip-block is a discourse plugin that adds support for adding users to groups based on their IP address. discourse-group-membership-ip-block was sending all group custom fields to the client, including group custom fields from other plugins which may expect their custom fields to remain secret.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024

CVE-2024-24945

Publication date:
01/02/2024
A stored cross-site scripting (XSS) vulnerability in Travel Journal Using PHP and MySQL with Source Code v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Share Your Moments parameter at /travel-journal/write-journal.php.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2024-24041

Publication date:
01/02/2024
A stored cross-site scripting (XSS) vulnerability in Travel Journal Using PHP and MySQL with Source Code v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the location parameter at /travel-journal/write-journal.php.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2024-24569

Publication date:
01/02/2024
The Pixee Java Code Security Toolkit is a set of security APIs meant to help secure Java code. `ZipSecurity#isBelowCurrentDirectory` is vulnerable to a partial-path traversal bypass. To be vulnerable to the bypass, the application must use toolkit version
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024

CVE-2023-5841

Publication date:
01/02/2024
Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions v3.2.2 and v3.1.12 of the affected library.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-51446

Publication date:
01/02/2024
GLPI is a Free Asset and IT Management Software package. When authentication is made against a LDAP, the authentication form can be used to perform LDAP injection. Upgrade to 10.0.12.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2024

CVE-2024-1167

Publication date:
01/02/2024
<br /> When SEW-EURODRIVE MOVITOOLS MotionStudio processes XML information unrestricted file access can occur.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024

CVE-2024-23645

Publication date:
01/02/2024
GLPI is a Free Asset and IT Management Software package. A malicious URL can be used to execute XSS on reports pages. Upgrade to 10.0.12.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2024

CVE-2024-24561

Publication date:
01/02/2024
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.10 and earlier, the bounds check for slices does not account for the ability for start + length to overflow when the values aren&amp;#39;t literals. If a slice() function uses a non-literal argument for the start or length variable, this creates the ability for an attacker to overflow the bounds check. This issue can be used to do OOB access to storage, memory or calldata addresses. It can also be used to corrupt the length slot of the respective array.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024