Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52953

Publication date:
08/01/2025
Path traversal vulnerability in the Medialibrary module<br /> Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2025

CVE-2024-56434

Publication date:
08/01/2025
UAF vulnerability in the device node access module<br /> Impact: Successful exploitation of this vulnerability may cause service exceptions of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2025

CVE-2024-56435

Publication date:
08/01/2025
Cross-process screen stack vulnerability in the UIExtension module<br /> Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2025

CVE-2024-56436

Publication date:
08/01/2025
Cross-process screen stack vulnerability in the UIExtension module<br /> Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2025

CVE-2024-55355

Publication date:
08/01/2025
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2025

CVE-2024-55356

Publication date:
08/01/2025
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2025

CVE-2024-50603

Publication date:
08/01/2025
An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2024-40679

Publication date:
08/01/2025
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an information disclosure vulnerability as sensitive information may be included in a log file under specific conditions.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2018-4301

Publication date:
08/01/2025
This issue is fixed in SCSSU-201801. A potential stack based buffer overflow existed in GemaltoKeyHandle.cpp.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2025

CVE-2025-22132

Publication date:
07/01/2025
WeGIA is a web manager for charitable institutions. A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. By uploading a file containing malicious JavaScript code, an attacker can execute arbitrary scripts in the context of a victim&amp;#39;s browser. This can lead to information theft, session hijacking, and other forms of client-side exploitation. This vulnerability is fixed in 3.2.7.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2025-22133

Publication date:
07/01/2025
WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2024-10541

Publication date:
07/01/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. This is not a valid vulnerability. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025