Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-7525

Publication date:
06/08/2024
It was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-7526

Publication date:
06/08/2024
ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2024

CVE-2024-7527

Publication date:
06/08/2024
Unexpected marking work at the start of sweeping could have led to a use-after-free. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-7528

Publication date:
06/08/2024
Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-7530

Publication date:
06/08/2024
Incorrect garbage collection interaction could have led to a use-after-free. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-7531

Publication date:
06/08/2024
Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2025

CVE-2024-7551

Publication date:
06/08/2024
A vulnerability was found in juzaweb CMS up to 3.4.2. It has been classified as problematic. Affected is an unknown function of the file /admin-cp/theme/editor/default of the component Theme Editor. The manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273696. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-7521

Publication date:
06/08/2024
Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-7529

Publication date:
06/08/2024
The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-6357

Publication date:
06/08/2024
Insecure Direct Object Reference vulnerability identified in OpenText ArcSight Intelligence.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024

CVE-2024-6358

Publication date:
06/08/2024
Incorrect Authorization vulnerability identified in OpenText ArcSight Intelligence.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024

CVE-2024-6359

Publication date:
06/08/2024
Privilege escalation vulnerability identified in OpenText ArcSight Intelligence.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024