Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-34003

Publication date:
31/05/2024
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-34004

Publication date:
31/05/2024
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-34005

Publication date:
31/05/2024
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-34006

Publication date:
31/05/2024
The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-34007

Publication date:
31/05/2024
The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-34008

Publication date:
31/05/2024
Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-34009

Publication date:
31/05/2024
Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-5138

Publication date:
31/05/2024
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2025

CVE-2024-34000

Publication date:
31/05/2024
ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-34001

Publication date:
31/05/2024
Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-36843

Publication date:
31/05/2024
libmodbus v3.1.6 was discovered to contain a heap overflow via the modbus_mapping_free() function.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-36844

Publication date:
31/05/2024
libmodbus v3.1.6 was discovered to contain a use-after-free via the ctx->backend pointer. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025