Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52354

Publication date:
22/01/2024
chasquid before 1.13 allows SMTP smuggling because LF-terminated lines are accepted.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2017-20189

Publication date:
22/01/2024
In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-22113

Publication date:
22/01/2024
Open redirect vulnerability in Access analysis CGI An-Analyzer released in 2023 December 31 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary websites and conduct phishing attacks via a specially crafted URL.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-47352

Publication date:
22/01/2024
Technicolor TC8715D devices have predictable default WPA2 security passwords. An attacker who scans for SSID and BSSID values may be able to predict these passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-21484

Publication date:
22/01/2024
Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key.<br /> <br /> Workaround <br /> <br /> The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2024

CVE-2024-23770

Publication date:
22/01/2024
darkhttpd through 1.15 allows local users to discover credentials (for --auth) by listing processes and their arguments.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-23771

Publication date:
22/01/2024
darkhttpd before 1.15 uses strcmp (which is not constant time) to verify authentication, which makes it easier for remote attackers to bypass authentication via a timing side channel.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-23768

Publication date:
22/01/2024
Dremio before 24.3.1 allows path traversal. An authenticated user who has no privileges on certain folders (and the files and datasets in these folders) can access these folders, files, and datasets. To be successful, the user must have access to the source and at least one folder in the source. Affected versions are: 24.0.0 through 24.3.0, 23.0.0 through 23.2.3, and 22.0.0 through 22.2.2. Fixed versions are: 24.3.1 and later, 23.2.4 and later, and 22.2.3 and later.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-0774

Publication date:
22/01/2024
A vulnerability was found in Any-Capture Any Sound Recorder 2.93. It has been declared as problematic. This vulnerability affects unknown code of the component Registration Handler. The manipulation of the argument User Name/Key Code leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-251674 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-0776

Publication date:
22/01/2024
A vulnerability, which was classified as problematic, has been found in LinZhaoguan pb-cms 2.0. Affected by this issue is some unknown functionality of the component Comment Handler. The manipulation with the input leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251678 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-23750

Publication date:
22/01/2024
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCode.run_script() passes shell metacharacters to subprocess.Popen.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-23751

Publication date:
22/01/2024
LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feature in NLSQLTableQueryEngine, SQLTableRetrieverQueryEngine, NLSQLRetriever, RetrieverQueryEngine, and PGVectorSQLQueryEngine. For example, an attacker might be able to delete this year&amp;#39;s student records via "Drop the Students table" within English language input.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025