Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-1647

Publication date:
20/02/2024
Pyhtml2pdf version 0.0.6 allows an external attacker to remotely obtain<br /> <br /> arbitrary local files. This is possible because the application does not<br /> <br /> validate the HTML content entered by the user.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2025

CVE-2024-1648

Publication date:
20/02/2024
electron-pdf version 20.0.0 allows an external attacker to remotely obtain<br /> <br /> arbitrary local files. This is possible because the application does not<br /> <br /> validate the HTML content entered by the user.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2025

CVE-2022-48625

Publication date:
20/02/2024
Yealink Config Encrypt Tool add RSA before 1.2 has a built-in RSA key pair, and thus there is a risk of decryption by an adversary.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2025

CVE-2024-1644

Publication date:
20/02/2024
Suite CRM version 7.14.2 allows including local php files. This is possible<br /> <br /> because the application is vulnerable to LFI.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2024

CVE-2024-1651

Publication date:
20/02/2024
Torrentpier version 2.4.1 allows executing arbitrary commands on the server.<br /> <br /> This is possible because the application is vulnerable to insecure deserialization.<br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-1297

Publication date:
20/02/2024
Loomio version 2.22.0 allows executing arbitrary commands on the server.<br /> <br /> This is possible because the application is vulnerable to OS Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2026

CVE-2024-26134

Publication date:
19/02/2024
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2024-26129

Publication date:
19/02/2024
PrestaShop is an open-source e-commerce platform. Starting in version 8.1.0 and prior to version 8.1.4, PrestaShop is vulnerable to path disclosure in a JavaScript variable. A patch is available in version 8.1.4.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025

CVE-2023-6259

Publication date:
19/02/2024
Insufficiently Protected Credentials, : Improper Access Control vulnerability in Brivo ACS100, ACS300 allows Password Recovery Exploitation, Bypassing Physical Security.This issue affects ACS100, ACS300: from 5.2.4 before 6.2.4.3.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2023-6260

Publication date:
19/02/2024
Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS Command Injection&amp;#39;) vulnerability in Brivo ACS100, ACS300 allows OS Command Injection, Bypassing Physical Security.This issue affects ACS100 (Network Adjacent Access), ACS300 (Physical Access): from 5.2.4 before 6.2.4.3.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2024-1635

Publication date:
19/02/2024
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. <br /> <br /> At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.
Severity CVSS v4.0: Pending analysis
Last modification:
25/06/2025

CVE-2024-1638

Publication date:
19/02/2024
The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025