Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-11860

Publication date:
27/11/2024
A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
04/12/2024

CVE-2024-21703

Publication date:
27/11/2024
This Medium severity Security Misconfiguration vulnerability was introduced in version 8.8.1 of Confluence Data Center and Server for Windows installations.<br /> <br /> <br /> <br /> This Security Misconfiguration vulnerability, with a CVSS Score of 6.4 allows an authenticated attacker of the Windows host to read sensitive information about the Confluence Data Center configuration which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.<br /> <br /> <br /> <br /> Atlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:<br /> <br /> * Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.18 <br /> * Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.5<br /> * Confluence Data Center and Server 8.7: Upgrade to a release greater than or equal to 8.7.2<br /> * Confluence Data Center and Server 8.8: Upgrade to a release greater than or equal to 8.8.0<br /> <br /> <br /> <br /> See the release notes (https://confluence.atlassian.com/conf88/confluence-release-notes-1354501008.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). <br /> <br /> This vulnerability was reported via our Atlassian Bug Bounty Program by Chris Elliot.
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2025

CVE-2024-31976

Publication date:
27/11/2024
EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker to execute arbitrary OS commands via the Controller connectivity parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2024-46054

Publication date:
27/11/2024
OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /upload route is accessible without authentication, allowing any user to upload files.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2024-46055

Publication date:
27/11/2024
OpenVidReview 1.0 is vulnerable to Cross Site Scripting (XSS) in review names.
Severity CVSS v4.0: Pending analysis
Last modification:
15/05/2025

CVE-2024-53920

Publication date:
27/11/2024
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-52951

Publication date:
27/11/2024
Stored Cross-Site Scripting in the Access Request History in Omada Identity before version 15 update 1 allows an authenticated attacker to execute arbitrary code in the browser of a victim via a specially crafted link or by viewing a manipulated Access Request History
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-11862

Publication date:
27/11/2024
Non constant time cryptographic operation in Devolutions.XTS.NET 2024.11.19 and earlier allows an attacker to render half of the encryption key obsolete via a timing attacks
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2024-53604

Publication date:
27/11/2024
A SQL Injection vulnerability was found in /covid-tms/check_availability.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the mobnumber POST request parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-53635

Publication date:
27/11/2024
A Reflected Cross Site Scripting (XSS) vulnerability was found in /covid-tms/patient-search-report.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata POST request parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2024-53603

Publication date:
27/11/2024
A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-36464

Publication date:
27/11/2024
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025