Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-50358

Publication date:
13/02/2024
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following versions:<br /> QTS 5.1.5.2645 build 20240116 and later<br /> QTS 4.5.4.2627 build 20231225 and later<br /> QTS 4.3.6.2665 build 20240131 and later<br /> QTS 4.3.4.2675 build 20240131 and later<br /> QTS 4.3.3.2644 build 20240131 and later<br /> QTS 4.2.6 build 20240131 and later<br /> QuTS hero h5.1.5.2647 build 20240118 and later<br /> QuTS hero h4.5.4.2626 build 20231225 and later<br /> QuTScloud c5.1.5.2651 and later
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2025

CVE-2024-22126

Publication date:
13/02/2024
The User Admin application of SAP NetWeaver AS for Java - version 7.50, insufficiently validates and improperly encodes the incoming URL parameters before including them into the redirect URL. This results in Cross-Site Scripting (XSS) vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2024-22128

Publication date:
13/02/2024
SAP NWBC for HTML - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An unauthenticated attacker can inject malicious javascript to cause limited impact to confidentiality and integrity of the application data after successful exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2026

CVE-2023-49339

Publication date:
13/02/2024
Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2023-52059

Publication date:
13/02/2024
A cross-site scripting (XSS) vulnerability in Gestsup v3.2.46 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2025

CVE-2023-52060

Publication date:
13/02/2024
A Cross-Site Request Forgery (CSRF) in Gestsup v3.2.46 allows attackers to arbitrarily edit user profile information via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-25407

Publication date:
13/02/2024
SteVe v3.6.0 was discovered to use predictable transaction ID&amp;#39;s when receiving a StartTransaction request. This vulnerability can allow attackers to cause a Denial of Service (DoS) by using the predicted transaction ID&amp;#39;s to terminate other transactions.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2025

CVE-2023-42374

Publication date:
13/02/2024
An issue in mystenlabs Sui Blockchain before v.1.6.3 allow a remote attacker to execute arbitrary code and cause a denial of service via a crafted compressed script to the Sui node component.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2024

CVE-2023-28018

Publication date:
12/02/2024
HCL Connections is vulnerable to a denial of service, caused by improper validation on certain requests. Using a specially-crafted request an attacker could exploit this vulnerability to cause denial of service for affected users.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2023-52430

Publication date:
12/02/2024
The caddy-security plugin 1.1.20 for Caddy allows reflected XSS via a GET request to a URL that contains an XSS payload and begins with either a /admin or /settings/mfa/delete/ substring.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2024-24826

Publication date:
12/02/2024
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 version v0.28.1. The vulnerable function, `QuickTimeVideo::NikonTagsDecoder`, was new in v0.28.0, so Exiv2 versions before v0.28 are _not_ affected. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted video file. In most cases this out of bounds read will result in a crash. This bug is fixed in version v0.28.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-25112

Publication date:
12/02/2024
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A denial-of-service was found in Exiv2 version v0.28.1: an unbounded recursion can cause Exiv2 to crash by exhausting the stack. The vulnerable function, `QuickTimeVideo::multipleEntriesDecoder`, was new in v0.28.0, so Exiv2 versions before v0.28 are _not_ affected. The denial-of-service is triggered when Exiv2 is used to read the metadata of a crafted video file. This bug is fixed in version v0.28.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024