Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-33664

Publication date:
26/04/2024
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2025

CVE-2024-32651

Publication date:
26/04/2024
changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced).
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2024

CVE-2024-32868

Publication date:
26/04/2024
ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email. While ZITADEL already gives administrators the option to define a `Lockout Policy` with a maximum amount of failed password check attempts, there was no such mechanism for (T)OTP checks. This issue has been patched in version 2.50.0.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2025

CVE-2024-33661

Publication date:
26/04/2024
Portainer before 2.20.0 allows redirects when the target is not index.yaml.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2025

CVE-2024-0916

Publication date:
25/04/2024
Unauthenticated file upload allows remote code execution.<br /> This issue affects UvDesk Community: from 1.0.0 through 1.1.3.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2024

CVE-2024-3265

Publication date:
25/04/2024
The Advanced Search WordPress plugin through 1.1.6 does not properly escape parameters appended to an SQL query, making it possible for users with the administrator role to conduct SQL Injection attacks in the context of a multisite WordPress configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2025

CVE-2024-31609

Publication date:
25/04/2024
Cross Site Scripting (XSS) vulnerability in BOSSCMS v3.10 allows attackers to run arbitrary code via the header code and footer code fields in code configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2025

CVE-2024-31610

Publication date:
25/04/2024
File Upload vulnerability in the function for employees to upload avatars in Code-Projects Simple School Management System v1.0 allows attackers to run arbitrary code via upload of crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2022-36028

Publication date:
25/04/2024
Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2022-36029

Publication date:
25/04/2024
Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-31615

Publication date:
25/04/2024
ThinkCMF 6.0.9 is vulnerable to File upload via UeditorController.php.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2025

CVE-2024-32324

Publication date:
25/04/2024
Buffer Overflow vulnerability in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v.3.2 allows a local attacker to execute arbitrary code via the vpn_client_ip variable of the config_vpn_pptp function in rc program.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2025