Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-11858

Publication date:
15/12/2024
A flaw was found in Radare2, which contains a command injection vulnerability caused by insufficient input validation when handling Pebble Application files. Maliciously crafted inputs can inject shell commands during command parsing, leading to unintended behavior during file processing​
Severity CVSS v4.0: Pending analysis
Last modification:
15/12/2024

CVE-2024-7701

Publication date:
15/12/2024
Use of Password Hash With Insufficient Computational Effort vulnerability in percona percona-toolkit allows Encryption Brute Forcing.This issue affects percona-toolkit: 3.6.0.
Severity CVSS v4.0: MEDIUM
Last modification:
15/12/2024

CVE-2024-56082

Publication date:
15/12/2024
ChatBar.tsx in Lumos before 1.0.17 parses raw HTML in Markdown because the markdown-to-jsx package is used without disableParsingRawHTML set to true.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2024

CVE-2024-56074

Publication date:
15/12/2024
gitingest before 9996a06 mishandles symbolic links that point outside of the base directory.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2024

CVE-2024-55969

Publication date:
15/12/2024
DocIO in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 throws XMLException during the resaving of a DOCX document with an external reference XML, aka I640714.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2024

CVE-2024-56073

Publication date:
15/12/2024
An issue was discovered in FastNetMon Community Edition through 1.2.7. Zero-length templates for Netflow v9 allow remote attackers to cause a denial of service (divide-by-zero error and application crash).
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-56072

Publication date:
15/12/2024
An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-55970

Publication date:
15/12/2024
File Manager in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 has a traversal issue that is related to the request parameter, aka I644734.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2024

CVE-2024-31892

Publication date:
14/12/2024
IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 could allow a user to perform unauthorized actions after intercepting and modifying a csv file due to improper neutralization of formula elements.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2025

CVE-2024-31891

Publication date:
14/12/2024
IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 <br /> <br /> contains a local privilege escalation vulnerability. A malicious actor with command line access to the &amp;#39;scalemgmt&amp;#39; user can elevate privileges to gain root access to the host operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2025

CVE-2024-11721

Publication date:
14/12/2024
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.24.5. This is due to insufficient controls on the user role select field when utilizing the &amp;#39;Role&amp;#39; field in a form. This makes it possible for unauthenticated attackers to create new administrative user accounts, even when the administrative user role has not been provided as an option to the user, granted that unauthenticated users have been provided access to the form.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025

CVE-2024-11720

Publication date:
14/12/2024
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via submission forms in all versions up to, and including, 3.24.5 due to insufficient input sanitization and output escaping on the new Taxonomy form. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This is only exploitable when lower-level users have been granted access to submit specific forms, which is disabled by default.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025