Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-6697

Publication date:
24/01/2024
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2024

CVE-2024-22154

Publication date:
24/01/2024
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SNP Digital SalesKing.This issue affects SalesKing: from n/a through 1.6.15.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2024

CVE-2023-50944

Publication date:
24/01/2024
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated user to access the source code of a DAG to which they don&amp;#39;t have access. This vulnerability is considered low since it requires an authenticated user to exploit it. Users are recommended to upgrade to version 2.8.1, which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2023-51702

Publication date:
24/01/2024
Since version 5.2.0, when using deferrable mode with the path of a Kubernetes configuration file for authentication, the Airflow worker serializes this configuration file as a dictionary and sends it to the triggerer by storing it in metadata without any encryption. Additionally, if used with an Airflow version between 2.3.0 and 2.6.0, the configuration dictionary will be logged as plain text in the triggerer service without masking. This allows anyone with access to the metadata or triggerer log to obtain the configuration file and use it to access the Kubernetes cluster.<br /> <br /> This behavior was changed in version 7.0.0, which stopped serializing the file contents and started providing the file path instead to read the contents into the trigger. Users are recommended to upgrade to version 7.0.0, which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2023-50943

Publication date:
24/01/2024
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-22294

Publication date:
24/01/2024
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in IP2Location IP2Location Country Blocker.This issue affects IP2Location Country Blocker: from n/a through 2.33.3.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2024

CVE-2024-22301

Publication date:
24/01/2024
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Ignazio Scimone Albo Pretorio On line.This issue affects Albo Pretorio On line: from n/a through 4.6.6.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2024

CVE-2024-22308

Publication date:
24/01/2024
URL Redirection to Untrusted Site (&amp;#39;Open Redirect&amp;#39;) vulnerability in smp7, wp.Insider Simple Membership.This issue affects Simple Membership: from n/a through 4.4.1.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2024

CVE-2024-22309

Publication date:
24/01/2024
Deserialization of Untrusted Data vulnerability in QuantumCloud ChatBot with AI.This issue affects ChatBot with AI: from n/a through 5.1.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2024-22134

Publication date:
24/01/2024
Server-Side Request Forgery (SSRF) vulnerability in Renzo Johnson Contact Form 7 Extension For Mailchimp.This issue affects Contact Form 7 Extension For Mailchimp: from n/a through 0.5.70.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2024

CVE-2024-22135

Publication date:
24/01/2024
Unrestricted Upload of File with Dangerous Type vulnerability in WebToffee Order Export &amp; Order Import for WooCommerce.This issue affects Order Export &amp; Order Import for WooCommerce: from n/a through 2.4.3.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2024

CVE-2024-22152

Publication date:
24/01/2024
Unrestricted Upload of File with Dangerous Type vulnerability in WebToffee Product Import Export for WooCommerce.This issue affects Product Import Export for WooCommerce: from n/a through 2.3.7.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2024