Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6197

Publication date:
24/07/2024
libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. Unfortunately, when doing so it also invokes `free()` on a 4 byte localstack buffer. Most modern malloc implementations detect this error and immediately abort. Some however accept the input pointer and add that memory to its list of available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. The most likely outcome of exploting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2024

CVE-2024-6874

Publication date:
24/07/2024
libcurl&amp;#39;s URL API function<br /> [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode<br /> conversions, to and from IDN. Asking to convert a name that is exactly 256<br /> bytes, libcurl ends up reading outside of a stack based buffer when built to<br /> use the *macidn* IDN backend. The conversion function then fills up the<br /> provided buffer exactly - but does not null terminate the string.<br /> <br /> This flaw can lead to stack contents accidently getting returned as part of<br /> the converted string.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2023-32471

Publication date:
24/07/2024
Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds read vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability to read contents of stack memory and use this information for further exploits.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2024

CVE-2023-48362

Publication date:
24/07/2024
XXE in the XML Format Plugin in Apache Drill version 1.19.0 and greater allows a user to read any file on a remote file system or execute commands via a malicious XML file.<br /> Users are recommended to upgrade to version 1.21.2, which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-39676

Publication date:
24/07/2024
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Pinot.<br /> <br /> This issue affects Apache Pinot: from 0.1 before 1.0.0.<br /> <br /> Users are recommended to upgrade to version 1.0.0 and configure RBAC, which fixes the issue.<br /> <br /> Details: <br /> <br /> When using a request to path “/appconfigs” to the controller, it can lead to the disclosure of sensitive information such as system information (e.g. arch, os version), environment information (e.g. maxHeapSize) and Pinot configurations (e.g. zookeeper path). This issue was addressed by the Role-based Access Control https://docs.pinot.apache.org/operators/tutorials/authentication/basic-auth-access-control , so that /appConfigs` and all other APIs can be access controlled. Only authorized users have access to it. Note the user needs to add the admin role accordingly to the RBAC guide to control access to this endpoint, and in the future version of Pinot, a default admin role is planned to be added.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2024-3297

Publication date:
24/07/2024
An issue in the Certificate Authenticated Session Establishment (CASE) protocol for establishing secure sessions between two devices, as implemented in the Matter protocol versions before Matter 1.1 allows an attacker to replay manipulated CASE Sigma1 messages to make the device unresponsive until the device is power-cycled.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-6553

Publication date:
24/07/2024
The WP Meteor Website Speed Optimization Addon plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.4.3.This is due to the plugin utilizing wpdesk and leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2024

CVE-2024-6571

Publication date:
24/07/2024
The Optimize Images ALT Text (alt tag) &amp; names for SEO using AI plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.1. This is due the plugin utilizing cocur and not preventing direct access to the generate-default.php file. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2024

CVE-2024-6629

Publication date:
24/07/2024
The All-in-One Video Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s Video shortcode in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
14/08/2024

CVE-2023-32466

Publication date:
24/07/2024
Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds write vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability leading to exposure of some UEFI code, leading to arbitrary code execution or escalation of privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2024

CVE-2024-6836

Publication date:
24/07/2024
The Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels, Order Bumps &amp; One Click Upsells plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple functions in all versions up to, and including, 3.4.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to update multiple settings, including templates, designs, checkouts, and other plugin settings.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2024

CVE-2024-6094

Publication date:
24/07/2024
The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024