Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-24680

Publication date:
06/02/2024
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2023-45227

Publication date:
06/02/2024
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> An attacker with access to the web application with vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "dns.0.server" parameter.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2024

CVE-2023-45735

Publication date:
06/02/2024
<br /> <br /> <br /> <br /> <br /> A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device.<br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2024

CVE-2024-1260

Publication date:
06/02/2024
A vulnerability classified as critical has been found in Juanpao JPShop up to 1.5.02. This affects the function actionIndex of the file /api/controllers/admin/app/ComboController.php of the component API. The manipulation of the argument pic_url leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252999.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-1261

Publication date:
06/02/2024
A vulnerability classified as critical was found in Juanpao JPShop up to 1.5.02. This vulnerability affects the function actionIndex of the file /api/controllers/merchant/app/ComboController.php of the component API. The manipulation of the argument pic_url leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253000.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-22519

Publication date:
06/02/2024
An issue discovered in OpenDroneID OSM 3.5.1 allows attackers to impersonate other drones via transmission of crafted data packets.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025

CVE-2024-22520

Publication date:
06/02/2024
An issue discovered in Dronetag Drone Scanner 1.5.2 allows attackers to impersonate other drones via transmission of crafted data packets.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2023-40143

Publication date:
06/02/2024
<br /> An attacker with access to the Westermo Lynx web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "forward.0.domain" parameter.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2024

CVE-2023-40544

Publication date:
06/02/2024
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> An attacker with access to the network where the affected devices are located could maliciously actions to obtain, via a sniffer, sensitive information exchanged via TCP communications.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2024

CVE-2023-42765

Publication date:
06/02/2024
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> An attacker with access to the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "username" parameter in the SNMP configuration.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2024

CVE-2023-45213

Publication date:
06/02/2024
<br /> <br /> <br /> <br /> <br /> <br /> <br /> A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2024

CVE-2023-45222

Publication date:
06/02/2024
<br /> <br /> <br /> An attacker with access to the web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "autorefresh" parameter.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2024