Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52047

Publication date:
28/02/2024
Dedecms v5.7.112 was discovered to contain a Cross-Site Request Forgery (CSRF) in the file manager.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2024-24148

Publication date:
28/02/2024
A memory leak issue discovered in parseSWF_FREECHARACTER in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2025

CVE-2023-52048

Publication date:
28/02/2024
RuoYi v4.7.8 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /system/notice/.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2024-25170

Publication date:
28/02/2024
An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2024-25859

Publication date:
28/02/2024
A path traversal vulnerability in the /path/to/uploads/ directory of Blesta before v5.9.2 allows attackers to takeover user accounts and execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2025

CVE-2024-27948

Publication date:
28/02/2024
Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.This issue affects Atahualpa: from n/a through 3.7.24.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2023-51692

Publication date:
28/02/2024
Missing Authorization vulnerability in CusRev Customer Reviews for WooCommerce.This issue affects Customer Reviews for WooCommerce: from n/a through 5.38.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2023-51533

Publication date:
28/02/2024
Cross-Site Request Forgery (CSRF) vulnerability in Ecwid Ecommerce Ecwid Ecommerce Shopping Cart.This issue affects Ecwid Ecommerce Shopping Cart: from n/a through 6.12.4.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2024-1847

Publication date:
28/02/2024
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2024

CVE-2024-27103

Publication date:
28/02/2024
Querybook is a Big Data Querying UI. When a user searches for their queries, datadocs, tables and lists, the search result is marked and highlighted, and this feature uses dangerouslySetInnerHTML which means that if the highlighted result has an XSS payload it will trigger. While the input to dangerouslySetInnerHTML is not sanitized for the data inside of queries which leads to an XSS vulnerability. During the "query auto-suggestion" the name of the suggested tables are set with innerHTML which leads to the XSS vulnerability. A patch to rectify this issue has been introduced in Querybook version 3.31.2.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-26342

Publication date:
28/02/2024
A Null pointer dereference in usr/sbin/httpd in ASUS AC68U 3.0.0.4.384.82230 allows remote attackers to trigger DoS via network packet.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2024-0560

Publication date:
28/02/2024
A vulnerability was found in 3Scale, when used with Keycloak 15 (or RHSSO 7.5.0) and superiors. When the auth_type is use_3scale_oidc_issuer_endpoint, the Token Introspection policy discovers the Token Introspection endpoint from the token_introspection_endpoint field, but the field was removed on RH-SSO 7.5. As a result, the policy doesn&amp;#39;t inspect tokens, it determines that all tokens are valid.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025