Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-23185

Publication date:
10/09/2024
Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up "full_value" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2022-45856

Publication date:
10/09/2024
An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to man-in-the-middle the communication between the FortiClient and  both the service provider and the identity provider.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-44867

Publication date:
10/09/2024
phpok v3.0 was discovered to contain an arbitrary file read vulnerability via the component /autoload/file.php.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-8654

Publication date:
10/09/2024
MongoDB Server may access non-initialized region of memory leading to unexpected behaviour when zero arguments are called in internal aggregation stage. This issue affected MongoDB Server v6.0 version 6.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2024-8443

Publication date:
10/09/2024
A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-37227

Publication date:
10/09/2024
Loftware Spectrum before 4.6 HF13 Deserializes Untrusted Data.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2023-37229

Publication date:
10/09/2024
Loftware Spectrum before 5.1 allows SSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2023-37230

Publication date:
10/09/2024
Loftware Spectrum (testDeviceConnection) before 5.1 allows SSRF.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2023-37231

Publication date:
10/09/2024
Loftware Spectrum before 4.6 HF14 uses a Hard-coded Password.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2024-37728

Publication date:
10/09/2024
Arbitrary File Read vulnerability in Xi'an Daxi Information Technology Co., Ltd OfficeWeb365 v.7.18.23.0 and v8.6.1.0 allows a remote attacker to obtain sensitive information via the "Pic/Indexes" interface
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2023-37226

Publication date:
10/09/2024
Loftware Spectrum before 4.6 HF14 has Missing Authentication for a Critical Function.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2024-6282

Publication date:
10/09/2024
The Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-jltma-wrapper-link element in all versions up to, and including 2.0.6.4 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user clicks on the injected link.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024