Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-5254

Publication date:
17/07/2024
The Ultimate Addons for WPBakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ultimate_info_banner shortcode in all versions up to, and including, 3.19.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2024-5251

Publication date:
17/07/2024
The Ultimate Addons for WPBakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ultimate_pricing shortcode in all versions up to, and including, 3.19.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2024-41009

Publication date:
17/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix overrunning reservations in ringbuf<br /> <br /> The BPF ring buffer internally is implemented as a power-of-2 sized circular<br /> buffer, with two logical and ever-increasing counters: consumer_pos is the<br /> consumer counter to show which logical position the consumer consumed the<br /> data, and producer_pos which is the producer counter denoting the amount of<br /> data reserved by all producers.<br /> <br /> Each time a record is reserved, the producer that "owns" the record will<br /> successfully advance producer counter. In user space each time a record is<br /> read, the consumer of the data advanced the consumer counter once it finished<br /> processing. Both counters are stored in separate pages so that from user<br /> space, the producer counter is read-only and the consumer counter is read-write.<br /> <br /> One aspect that simplifies and thus speeds up the implementation of both<br /> producers and consumers is how the data area is mapped twice contiguously<br /> back-to-back in the virtual memory, allowing to not take any special measures<br /> for samples that have to wrap around at the end of the circular buffer data<br /> area, because the next page after the last data page would be first data page<br /> again, and thus the sample will still appear completely contiguous in virtual<br /> memory.<br /> <br /> Each record has a struct bpf_ringbuf_hdr { u32 len; u32 pg_off; } header for<br /> book-keeping the length and offset, and is inaccessible to the BPF program.<br /> Helpers like bpf_ringbuf_reserve() return `(void *)hdr + BPF_RINGBUF_HDR_SZ`<br /> for the BPF program to use. Bing-Jhong and Muhammad reported that it is however<br /> possible to make a second allocated memory chunk overlapping with the first<br /> chunk and as a result, the BPF program is now able to edit first chunk&amp;#39;s<br /> header.<br /> <br /> For example, consider the creation of a BPF_MAP_TYPE_RINGBUF map with size<br /> of 0x4000. Next, the consumer_pos is modified to 0x3000 /before/ a call to<br /> bpf_ringbuf_reserve() is made. This will allocate a chunk A, which is in<br /> [0x0,0x3008], and the BPF program is able to edit [0x8,0x3008]. Now, lets<br /> allocate a chunk B with size 0x3000. This will succeed because consumer_pos<br /> was edited ahead of time to pass the `new_prod_pos - cons_pos &gt; rb-&gt;mask`<br /> check. Chunk B will be in range [0x3008,0x6010], and the BPF program is able<br /> to edit [0x3010,0x6010]. Due to the ring buffer memory layout mentioned<br /> earlier, the ranges [0x0,0x4000] and [0x4000,0x8000] point to the same data<br /> pages. This means that chunk B at [0x4000,0x4008] is chunk A&amp;#39;s header.<br /> bpf_ringbuf_submit() / bpf_ringbuf_discard() use the header&amp;#39;s pg_off to then<br /> locate the bpf_ringbuf itself via bpf_ringbuf_restore_from_rec(). Once chunk<br /> B modified chunk A&amp;#39;s header, then bpf_ringbuf_commit() refers to the wrong<br /> page and could cause a crash.<br /> <br /> Fix it by calculating the oldest pending_pos and check whether the range<br /> from the oldest outstanding record to the newest would span beyond the ring<br /> buffer size. If that is the case, then reject the request. We&amp;#39;ve tested with<br /> the ring buffer benchmark in BPF selftests (./benchs/run_bench_ringbufs.sh)<br /> before/after the fix and while it seems a bit slower on some benchmarks, it<br /> is still not significantly enough to matter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-6808

Publication date:
17/07/2024
A vulnerability was found in itsourcecode Simple Task List 1.0. It has been classified as critical. This affects the function insertUserRecord of the file signUp.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271707.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2024

CVE-2024-6807

Publication date:
17/07/2024
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /sscdms/classes/Users.php?f=save of the component HTTP POST Request Handler. The manipulation of the argument firstname/middlename/lastname/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2024-6803

Publication date:
17/07/2024
A vulnerability has been found in itsourcecode Document Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file insert.php. The manipulation of the argument anothercont leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271705 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2024

CVE-2024-6535

Publication date:
17/07/2024
A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2024-6595

Publication date:
17/07/2024
An issue was discovered in GitLab CE/EE affecting all versions starting from 11.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 where it was possible to upload an NPM package with conflicting package data.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-6801

Publication date:
17/07/2024
A vulnerability, which was classified as critical, has been found in SourceCodester Online Student Management System 1.0. This issue affects some unknown processing of the file /add-students.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271703.
Severity CVSS v4.0: Pending analysis
Last modification:
19/07/2024

CVE-2024-6802

Publication date:
17/07/2024
A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-3173

Publication date:
16/07/2024
Insufficient data validation in Updater in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-3174

Publication date:
16/07/2024
Inappropriate implementation in V8 in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2025