Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-21689

Publication date:
20/08/2024
This High severity RCE (Remote Code Execution) vulnerability CVE-2024-21689  was introduced in versions 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0, and 9.6.0 of Bamboo Data Center and Server.<br /> <br /> This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.6, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.<br /> <br /> Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:<br /> Bamboo Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.17<br /> <br /> Bamboo Data Center and Server 9.6: Upgrade to a release greater than or equal to 9.6.5<br /> <br /> See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).<br /> <br /> This vulnerability was reported via our Bug Bounty program.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-38808

Publication date:
20/08/2024
In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition.<br /> <br /> Specifically, an application is vulnerable when the following is true:<br /> <br /> * The application evaluates user-supplied SpEL expressions.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2024-43202

Publication date:
20/08/2024
Exposure of Remote Code Execution in Apache Dolphinscheduler.<br /> <br /> This issue affects Apache DolphinScheduler: before 3.2.2. <br /> <br /> We recommend users to upgrade Apache DolphinScheduler to version 3.2.2, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-5576

Publication date:
20/08/2024
The Tutor LMS Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &amp;#39;course_carousel_skin&amp;#39; attribute within the plugin&amp;#39;s Course Carousel widget in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2025

CVE-2024-6847

Publication date:
20/08/2024
The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users when submitting messages to the chatbot.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-43688

Publication date:
20/08/2024
cron/entry.c in vixie cron before 9cc8ab1, as used in OpenBSD 7.4 and 7.5, allows a heap-based buffer underflow and memory corruption. NOTE: this issue was introduced during a May 2023 refactoring.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-6864

Publication date:
20/08/2024
The WP Last Modified Info plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘template’ attribute of the lmt-post-modified-info shortcode in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2024

CVE-2024-7782

Publication date:
20/08/2024
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form &amp; Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the iconRemove function in versions 2.0 to 2.13.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-7775

Publication date:
20/08/2024
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form &amp; Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary JavaScript file uploads due to missing input validation in the addCustomCode function in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary JavaScript files to the affected site&amp;#39;s server.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-7777

Publication date:
20/08/2024
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form &amp; Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in multiple functions in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to read and delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-7780

Publication date:
20/08/2024
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form &amp; Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-7702

Publication date:
20/08/2024
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form &amp; Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the entryID parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024