Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8630

Publication date:
27/09/2024
Alisonic Sibylla devices are vulnerable to SQL injection attacks, which could allow complete access to the database.
Severity CVSS v4.0: CRITICAL
Last modification:
16/10/2024

CVE-2024-9171

Publication date:
27/09/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024

CVE-2024-9268

Publication date:
27/09/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024

CVE-2024-9273

Publication date:
27/09/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024

CVE-2024-9284

Publication date:
27/09/2024
A vulnerability was found in TP-LINK TL-WR841ND up to 20240920. It has been rated as critical. Affected by this issue is some unknown functionality of the file /userRpm/popupSiteSurveyRpm.htm. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
15/07/2025

CVE-2024-46366

Publication date:
27/09/2024
A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025

CVE-2024-46367

Publication date:
27/09/2024
A Stored Cross-Site Scripting (XSS) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to inject arbitrary JavaScript code by submitting a malicious payload within the username field. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025

CVE-2024-6981

Publication date:
27/09/2024
OMNTEC Proteus Tank Monitoring OEL8000III Series<br /> <br /> <br /> could allow an attacker to perform administrative actions without proper authentication.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2024-8310

Publication date:
27/09/2024
OPW Fuel Management Systems SiteSentinel <br /> could allow an attacker to bypass authentication to the server and obtain full admin privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-22170

Publication date:
27/09/2024
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Western Digital My Cloud ddns-start on Linux allows Overflow Buffers.This issue affects My Cloud: before 5.29.102.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2024-38809

Publication date:
27/09/2024
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack.<br /> <br /> Users of affected versions should upgrade to the corresponding fixed version.<br /> <br /> Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-47077

Publication date:
27/09/2024
authentik is an open-source identity provider. Prior to versions 2024.8.3 and 2024.6.5, access tokens issued to one application can be stolen by that application and used to impersonate the user against any other proxy provider. Also, a user can steal an access token they were legitimately issued for one application and use it to access another application that they aren&amp;#39;t allowed to access. Anyone who has more than one proxy provider application with different trust domains or different access control is affected. Versions 2024.8.3 and 2024.6.5 fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2025