Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52919

Publication date:
22/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfc: nci: fix possible NULL pointer dereference in send_acknowledge()<br /> <br /> Handle memory allocation failure from nci_skb_alloc() (calling<br /> alloc_skb()) to avoid possible NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2024

CVE-2024-9541

Publication date:
22/10/2024
The News Kit Elementor Addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.1 via the render function in includes/widgets/canvas-menu/canvas-menu.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft Elementor template data.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2023-52918

Publication date:
22/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: pci: cx23885: check cx23885_vdev_init() return<br /> <br /> cx23885_vdev_init() can return a NULL pointer, but that pointer<br /> is used in the next line without a check.<br /> <br /> Add a NULL pointer check and go to the error unwind if it is NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-9627

Publication date:
22/10/2024
The TeploBot - Telegram Bot for WP plugin for WordPress is vulnerable to sensitive information disclosure due to missing authorization checks on the &amp;#39;service_process&amp;#39; function in all versions up to, and including, 1.3. This makes it possible for unauthenticated attackers to view the Telegram Bot Token, which is a secret token to control the bot.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-8852

Publication date:
22/10/2024
The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.86 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information such as full paths contained in the exposed log files.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-10003

Publication date:
22/10/2024
The Rover IDX plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 3.0.0.2903. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-10002

Publication date:
22/10/2024
The Rover IDX plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0.0.2905. This is due to insufficient validation and capability check on the &amp;#39;rover_idx_refresh_social_callback&amp;#39; function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in to administrator. The vulnerability is partially patched in version 3.0.0.2905 and fully patched in version 3.0.0.2906.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-9677

Publication date:
22/10/2024
The insufficiently protected credentials vulnerability in the CLI command of the USG FLEX H series uOS firmware version V1.21 and earlier versions could allow an authenticated local attacker to gain privilege escalation by stealing the authentication token of a login administrator. Note that this attack could be successful only if the administrator has not logged out.
Severity CVSS v4.0: Pending analysis
Last modification:
05/12/2024

CVE-2024-8901

Publication date:
22/10/2024
The AWS ALB Route Directive Adapter For Istio repo https://github.com/awslabs/aws-alb-route-directive-adapter-for-istio/tree/master provides an OIDC authentication mechanism that was integrated into the open source Kubeflow project. The adapter uses JWT for authentication, but lacks proper signer and issuer validation. In deployments of ALB that ignore security best practices, where ALB targets are directly exposed to internet traffic, an actor can provide a JWT signed by an untrusted entity in order to spoof OIDC-federated sessions and successfully bypass authentication.<br /> <br /> <br /> <br /> The repository/package has been deprecated, is end of life, and is no longer supported. As a security best practice, ensure that your ELB targets (e.g. EC2 Instances, Fargate Tasks etc.) do not have public IP addresses. Ensure any forked or derivative code validate that the signer attribute in the JWT match the ARN of the Application Load Balancer that the service is configured to use.
Severity CVSS v4.0: MEDIUM
Last modification:
14/10/2025

CVE-2024-10125

Publication date:
22/10/2024
The Amazon.ApplicationLoadBalancer.Identity.AspNetCore repo https://github.com/awslabs/aws-alb-identity-aspnetcore#validatetokensignature contains Middleware that can be used in conjunction with the Application Load Balancer (ALB) OpenId Connect integration and can be used in any ASP.NET https://dotnet.microsoft.com/apps/aspnet Core deployment scenario, including Fargate, EKS, ECS, EC2, and Lambda. In the JWT handling code, it performs signature validation but fails to validate the JWT issuer and signer identity. The signer omission, if combined with a scenario where the infrastructure owner allows internet traffic to the ALB targets (not a recommended configuration), can allow for JWT signing by an untrusted entity and an actor may be able to mimic valid OIDC-federated sessions to the ALB targets.<br /> <br /> <br /> <br /> The repository/package has been deprecated, is end of life, and is no longer supported. As a security best practice, ensure that your ELB targets (e.g. EC2 Instances, Fargate Tasks etc.) do not have public IP addresses. Ensure any forked or derivative code validate that the signer attribute in the JWT match the ARN of the Application Load Balancer that the service is configured to use.
Severity CVSS v4.0: MEDIUM
Last modification:
14/10/2025

CVE-2024-40087

Publication date:
21/10/2024
Vilo 5 Mesh WiFi System
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025

CVE-2024-40088

Publication date:
21/10/2024
A Directory Traversal vulnerability in the Boa webserver of Vilo 5 Mesh WiFi System
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025