Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-0949

Publication date:
27/06/2024
Missing Authentication, Files or Directories Accessible to External Parties, Use of Hard-coded Credentials vulnerability in Talya Informatics Elektraweb allows Authentication Bypass.This issue affects Elektraweb: before v17.0.68.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2025

CVE-2024-0947

Publication date:
27/06/2024
Reliance on Cookies without Validation and Integrity Checking vulnerability in Talya Informatics Elektraweb allows Session Credential Falsification through Manipulation, Accessing/Intercepting/Modifying HTTP Cookies, Manipulating Opaque Client-based Data Tokens.This issue affects Elektraweb: before v17.0.68.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2024

CVE-2023-7270

Publication date:
27/06/2024
An issue was discovered in SoftMaker Office 2024 / NX before revision 1214 and SoftMaker FreeOffice 2014 before revision 1215. FreeOffice 2021 is also affected, but won&amp;#39;t be fixed.<br /> <br /> <br /> <br /> <br /> <br /> The SoftMaker Office and FreeOffice MSI installer files were found to<br /> produce a visible conhost.exe window running as the SYSTEM user when <br /> using the repair function of msiexec.exe. This allows a local, <br /> low-privileged attacker to use a chain of actions, to open a fully <br /> functional cmd.exe with the privileges of the SYSTEM user.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-4983

Publication date:
27/06/2024
The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘video_color’ parameter in all versions up to, and including, 5.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2024-5601

Publication date:
27/06/2024
The Create by Mediavine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s Schema Meta shortcode in all versions up to, and including, 1.9.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2024

CVE-2024-22232

Publication date:
27/06/2024
A specially crafted url can be created which leads to a directory traversal in the salt file server.<br /> A malicious user can read an arbitrary file from a Salt master’s filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2024

CVE-2024-22231

Publication date:
27/06/2024
Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-4704

Publication date:
27/06/2024
The Contact Form 7 WordPress plugin before 5.9.5 has an open redirect that allows an attacker to utilize a false URL and redirect to the URL of their choosing.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-4664

Publication date:
27/06/2024
The WP Chat App WordPress plugin before 3.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admins to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-3111

Publication date:
27/06/2024
The Interactive Content WordPress plugin before 1.15.8 does not validate uploads which could allow a Contributors and above to update malicious SVG files, leading to Stored Cross-Site Scripting issues
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-1330

Publication date:
27/06/2024
The kadence-blocks-pro WordPress plugin before 2.3.8 does not prevent users with at least the contributor role using some of its shortcode&amp;#39;s functionalities to leak arbitrary options from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-6283

Publication date:
27/06/2024
The DethemeKit For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL parameter of the De Gallery widget in all versions up to and including 2.1.5 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user clicks on the injected link.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2024