Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-21465

Publication date:
01/07/2024
Memory corruption while processing key blob passed by the user.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2023-43554

Publication date:
01/07/2024
Memory corruption while processing IOCTL handler in FastRPC.
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2025

CVE-2024-21456

Publication date:
01/07/2024
Information Disclosure while parsing beacon frame in STA.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-21457

Publication date:
01/07/2024
INformation disclosure while handling Multi-link IE in beacon frame.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-21458

Publication date:
01/07/2024
Information disclosure while handling SA query action frame.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-38953

Publication date:
01/07/2024
phpok 6.4.003 contains a Cross Site Scripting (XSS) vulnerability in the ok_f() method under the framework/api/upload_control.php file.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2025

CVE-2024-6050

Publication date:
01/07/2024
Improper Neutralization of Input During Web Page Generation vulnerability in SOKRATES-software SOWA OPAC allows a Reflected Cross-Site Scripting (XSS). An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. This issue affects SOWA OPAC software in versions from 4.0 before 4.9.10, from 5.0 before 6.2.12.
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2024

CVE-2024-24749

Publication date:
01/07/2024
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.5 and 2.24.3, if GeoServer is deployed in the Windows operating system using an Apache Tomcat web application server, it is possible to bypass existing input validation in the GeoWebCache ByteStreamController class and read arbitrary classpath resources with specific file name extensions. If GeoServer is also deployed as a web archive using the data directory embedded in the `geoserver.war` file (rather than an external data directory), it will likely be possible to read specific resources to gain administrator privileges. However, it is very unlikely that production environments will be using the embedded data directory since, depending on how GeoServer is deployed, it will be erased and re-installed (which would also reset to the default password) either every time the server restarts or every time a new GeoServer WAR is installed and is therefore difficult to maintain. An external data directory will always be used if GeoServer is running in standalone mode (via an installer or a binary). Versions 2.23.5 and 2.24.3 contain a patch for the issue. Some workarounds are available. One may change from a Windows environment to a Linux environment; or change from Apache Tomcat to Jetty application server. One may also disable anonymous access to the embeded GeoWebCache administration and status pages.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-6387

Publication date:
01/07/2024
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2025

CVE-2024-39853

Publication date:
01/07/2024
adolph_dudu ratio-swiper 0.0.2 was discovered to contain a prototype pollution via the function parse. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-6424

Publication date:
01/07/2024
External server-side request vulnerability in MESbook 20221021.03 version, which could allow a remote, unauthenticated attacker to exploit the endpoint "/api/Proxy/Post?userName=&password=&uri=
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2024-6425

Publication date:
01/07/2024
Incorrect Provision of Specified Functionality vulnerability in MESbook 20221021.03 version. An unauthenticated remote attacker can register user accounts without being authenticated from the route "/account/Register/" and in the parameters "UserName=&Password=&ConfirmPassword=".
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025