Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-48441

Publication date:
24/10/2024
Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router CommonCPExCPETS_v3.2.468.11.04_P4 was discovered to contain a command injection vulnerability via the component at_command.asp.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-48442

Publication date:
24/10/2024
Incorrect access control in Shenzhen Tuoshi Network Communications Co.,Ltd 5G CPE Router NR500-EA RG500UEAABxCOMSLICv3.2.2543.12.18 allows attackers to access the SSH protocol without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-46478

Publication date:
24/10/2024
HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2024-38314

Publication date:
24/10/2024
IBM Maximo Application Suite - Monitor Component 8.10, 8.11, and 9.0 could disclose information in the form of the hard-coded cryptographic key to an attacker that has compromised environment.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025

CVE-2024-10337

Publication date:
24/10/2024
A vulnerability classified as critical has been found in SourceCodeHero Clothes Recommendation System 1.0. Affected is an unknown function of the file /admin/home.php?con=add. The manipulation of the argument cat/subcat/ t1/t2/text leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
30/10/2024

CVE-2024-10338

Publication date:
24/10/2024
A vulnerability classified as critical was found in SourceCodeHero Clothes Recommendation System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/home.php. The manipulation of the argument view/view1 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
30/10/2024

CVE-2024-10313

Publication date:
24/10/2024
iniNet Solutions SpiderControl SCADA PC HMI Editor has a path traversal <br /> vulnerability. When the software loads a malicious ‘ems&amp;#39; project <br /> template file constructed by an attacker, it can write files to <br /> arbitrary directories. This can lead to overwriting system files, <br /> causing system paralysis, or writing to startup items, resulting in <br /> remote control.
Severity CVSS v4.0: HIGH
Last modification:
25/10/2024

CVE-2024-10295

Publication date:
24/10/2024
A flaw was found in Gateway. Sending a non-base64 &amp;#39;basic&amp;#39; auth with special characters can cause APICast to incorrectly authenticate a request. A malformed basic authentication header containing special characters bypasses authentication and allows unauthorized access to the backend. This issue can occur due to a failure in the base64 decoding process, which causes APICast to skip the rest of the authentication checks and proceed with routing the request upstream.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2024-48544

Publication date:
24/10/2024
Incorrect access control in the firmware update and download processes of Sylvania Smart Home v3.0.3 allows attackers to access sensitive information by analyzing the code and data within the APK file.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-48548

Publication date:
24/10/2024
The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-9692

Publication date:
24/10/2024
VIMESA VHF/FM Transmitter Blue Plus is suffering from a Denial-of-Service (DoS) vulnerability. An unauthenticated attacker can issue an unauthorized HTTP GET request to the unprotected endpoint &amp;#39;doreboot&amp;#39; and restart the transmitter operations.
Severity CVSS v4.0: MEDIUM
Last modification:
25/10/2024

CVE-2024-48541

Publication date:
24/10/2024
Incorrect access control in the firmware update and download processes of Ruochan Smart v4.4.7 allows attackers to access sensitive information by analyzing the code and data within the APK file.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024