Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-43438

Publication date:
07/11/2024
A flaw was found in Feedback. Bulk messaging in the activity's non-respondents report did not verify message recipients belonging to the set of users returned by the report.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2024-43440

Publication date:
07/11/2024
A flaw was found in moodle. A local file may include risks when restoring block backups.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43434

Publication date:
07/11/2024
The bulk message sending feature in Moodle's Feedback module's non-respondents report had an incorrect CSRF token check, leading to a CSRF vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43436

Publication date:
07/11/2024
A SQL injection risk flaw was found in the XMLDB editor tool available to site administrators.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2024-43426

Publication date:
07/11/2024
A flaw was found in pdfTeX. Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available, such as those with TeX Live installed.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2024-43428

Publication date:
07/11/2024
To address a cache poisoning risk in Moodle, additional validation for local storage was required.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43425

Publication date:
07/11/2024
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-43431

Publication date:
07/11/2024
A vulnerability was found in Moodle. Insufficient capability checks made it possible to delete badges that a user does not have permission to access.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-8442

Publication date:
07/11/2024
The Prime Slider – Addons For Elementor (Revolution of a slider, Hero Slider, Ecommerce Slider) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Blog widget in all versions up to, and including, 3.15.18 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2024-24914

Publication date:
07/11/2024
Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2025

CVE-2024-10526

Publication date:
07/11/2024
Rapid7 Velociraptor MSI Installer versions below 0.73.3 suffer from a vulnerability whereby it creates the installation directory with WRITE_DACL permission to the BUILTIN\\Users group. This allows local users who are not administrators to grant themselves the Full Control permission on Velociraptor's files. By modifying Velociraptor's files, local users can subvert the binary and cause the Velociraptor service to execute arbitrary code as the SYSTEM user, or to replace the Velociraptor binary completely.  This issue is fixed in version 0.73.3.
Severity CVSS v4.0: HIGH
Last modification:
08/11/2024

CVE-2024-50169

Publication date:
07/11/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vsock: Update rx_bytes on read_skb()<br /> <br /> Make sure virtio_transport_inc_rx_pkt() and virtio_transport_dec_rx_pkt()<br /> calls are balanced (i.e. virtio_vsock_sock::rx_bytes doesn&amp;#39;t lie) after<br /> vsock_transport::read_skb().<br /> <br /> While here, also inform the peer that we&amp;#39;ve freed up space and it has more<br /> credit.<br /> <br /> Failing to update rx_bytes after packet is dequeued leads to a warning on<br /> SOCK_STREAM recv():<br /> <br /> [ 233.396654] rx_queue is empty, but rx_bytes is non-zero<br /> [ 233.396702] WARNING: CPU: 11 PID: 40601 at net/vmw_vsock/virtio_transport_common.c:589
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025