Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-25634

Publication date:
19/02/2024
alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, an attacker can access data from other organizers. The attacker can use a specially crafted request to receive the e-mail log sent by other events. Version 2.0-M4-2402 fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2024

CVE-2024-25635

Publication date:
19/02/2024
alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, organization owners can view the generated API KEY and USERS of other organization owners using the `http://192.168.26.128:8080/admin/api/users/` endpoint, which exposes the details of the provided user ID. This may also expose the API KEY in the username of the user. Version 2.0-M4-2402 fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2024

CVE-2023-50257

Publication date:
19/02/2024
eProsima Fast DDS (formerly Fast RTPS) is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Even with the application of SROS2, due to the issue where the data (`p[UD]`) and `guid` values used to disconnect between nodes are not encrypted, a vulnerability has been discovered where a malicious attacker can forcibly disconnect a Subscriber and can deny a Subscriber attempting to connect. Afterwards, if the attacker sends the packet for disconnecting, which is data (`p[UD]`), to the Global Data Space (`239.255.0.1:7400`) using the said Publisher ID, all the Subscribers (Listeners) connected to the Publisher (Talker) will not receive any data and their connection will be disconnected. Moreover, if this disconnection packet is sent continuously, the Subscribers (Listeners) trying to connect will not be able to do so. Since the initial commit of the `SecurityManager.cpp` code (`init`, `on_process_handshake`) on Nov 8, 2016, the Disconnect Vulnerability in RTPS Packets Used by SROS2 has been present prior to versions 2.13.0, 2.12.2, 2.11.3, 2.10.3, and 2.6.7.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2026

CVE-2024-25980

Publication date:
19/02/2024
Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups. By default this only provided additional access to non-editing teachers.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-25981

Publication date:
19/02/2024
Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups. By default this only provided additional access to non-editing teachers.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-25982

Publication date:
19/02/2024
The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-25983

Publication date:
19/02/2024
Insufficient checks in a web service made it possible to add comments to the comments block on another user's dashboard when it was not otherwise available (e.g., on their profile page).
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-1633

Publication date:
19/02/2024
During the secure boot, bl2 (the second stage of<br /> the bootloader) loops over images defined in the table “bl2_mem_params_descs”.<br /> For each image, the bl2 reads the image length and destination from the image’s<br /> certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot.<br /> <br /> Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not <br />
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2024-25978

Publication date:
19/02/2024
Insufficient file size checks resulted in a denial of service risk in the file picker&amp;#39;s unzip functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-25979

Publication date:
19/02/2024
The URL parameters accepted by forum search were not limited to the allowed parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-25625

Publication date:
19/02/2024
Pimcore&amp;#39;s Admin Classic Bundle provides a Backend UI for Pimcore. A potential security vulnerability has been discovered in `pimcore/admin-ui-classic-bundle` prior to version 1.3.4. The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker&amp;#39;s domain. In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user. This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain. Version 1.3.4 contains a patch for the vulnerability. The maintainers recommend validating the host header and ensuring it matches the application&amp;#39;s domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2024-25623

Publication date:
19/02/2024
Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.2.7, 4.1.15, 4.0.15, and 3.5.19, when fetching remote statuses, Mastodon doesn&amp;#39;t check that the response from the remote server has a `Content-Type` header value of the Activity Streams media type, which allows a threat actor to upload a crafted Activity Streams document to a remote server and make a Mastodon server fetch it, if the remote server accepts arbitrary user uploads. The vulnerability allows a threat actor to impersonate an account on a remote server that satisfies all of the following properties: allows the attacker to register an account; accepts arbitrary user-uploaded documents and places them on the same domain as the ActivityPub actors; and serves user-uploaded document in response to requests with an `Accept` header value of the Activity Streams media type. Versions 4.2.7, 4.1.15, 4.0.15, and 3.5.19 contain a fix for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2024