Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-26155

Publication date:
17/01/2025
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 <br /> expose clear text credentials in the web portal. An attacker can access <br /> the ETIC RAS web portal and view the HTML code, which is configured to <br /> be hidden, thus allowing a connection to the ETIC RAS ssh server, which <br /> could enable an attacker to perform actions on the device.
Severity CVSS v4.0: MEDIUM
Last modification:
30/07/2025

CVE-2024-26156

Publication date:
17/01/2025
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 <br /> are vulnerable to reflected cross site scripting (XSS) attacks in the <br /> method parameter. The ETIC RAS web server uses dynamic pages that gets <br /> their input from the client side and reflects the input in its response <br /> to the client.
Severity CVSS v4.0: MEDIUM
Last modification:
30/07/2025

CVE-2024-26157

Publication date:
17/01/2025
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 <br /> are vulnerable to reflected cross site scripting (XSS) attacks in get <br /> view method under view parameter. The ETIC RAS web server uses dynamic <br /> pages that get their input from the client side and reflect the input in<br /> their response to the client.
Severity CVSS v4.0: MEDIUM
Last modification:
31/07/2025

CVE-2024-45832

Publication date:
17/01/2025
Hard-coded credentials were included as part of the application binary. <br /> These credentials served as part of the application authentication flow <br /> and communication with the mobile application. An attacker could access <br /> unauthorized information.
Severity CVSS v4.0: LOW
Last modification:
17/01/2025

CVE-2024-26153

Publication date:
17/01/2025
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 <br /> are vulnerable to cross-site request forgery (CSRF). An external <br /> attacker with no access to the device can force the end user into <br /> submitting a "setconf" method request, not requiring any CSRF token, <br /> which can lead into denial of service on the device.
Severity CVSS v4.0: MEDIUM
Last modification:
30/07/2025

CVE-2025-0531

Publication date:
17/01/2025
A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/leaveroom.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
23/10/2025

CVE-2025-0530

Publication date:
17/01/2025
A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/_feedback_system.php. The manipulation of the argument type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
17/01/2025

CVE-2024-50967

Publication date:
17/01/2025
The /rest/rights/ REST API endpoint in Becon DATAGerry through 2.2.0 contains an Incorrect Access Control vulnerability. An attacker can remotely access this endpoint without authentication, leading to unauthorized disclosure of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2025-0528

Publication date:
17/01/2025
A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and AC18 16.03.10.20. Affected by this issue is some unknown functionality of the file /goform/telnet of the component HTTP Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
28/05/2025

CVE-2025-0529

Publication date:
17/01/2025
A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
23/10/2025

CVE-2025-0527

Publication date:
17/01/2025
A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Severity CVSS v4.0: MEDIUM
Last modification:
17/01/2025

CVE-2024-13502

Publication date:
17/01/2025
Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS Command Injection&amp;#39;) vulnerability in Newtec/iDirect NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM allows Local Code Inclusion.This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19.<br /> <br /> <br /> The `commit_multicast` page used to configure multicasts in the modem&amp;#39;s web administration interface uses improperly parses incoming data from the request before passing it to an `eval` statement in a bash script. This allows attackers to inject arbitrary shell commands.
Severity CVSS v4.0: CRITICAL
Last modification:
17/01/2025