Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-51255

Publication date:
31/10/2024
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-51260

Publication date:
31/10/2024
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-8185

Publication date:
31/10/2024
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.<br /> <br /> This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2024-50354

Publication date:
31/10/2024
gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2024-8553

Publication date:
31/10/2024
A vulnerability was found in Foreman&amp;#39;s loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman&amp;#39;s database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-48910

Publication date:
31/10/2024
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify was vulnerable to prototype pollution. This vulnerability is fixed in 2.4.2.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-51254

Publication date:
31/10/2024
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the sign_cacertificate function.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-51259

Publication date:
31/10/2024
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-42835

Publication date:
31/10/2024
langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-8934

Publication date:
31/10/2024
A local user with administrative access rights can enter specialy crafted values for settings at the user interface (UI) of the TwinCAT Package Manager which then causes arbitrary OS commands to be executed.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-10454

Publication date:
31/10/2024
Clickjacking vulnerability in Clibo Manager v1.1.9.12 in the &amp;#39;/public/login&amp;#39; directory, a login panel. This vulnerability occurs due to the absence of an X-Frame-Options server-side header. An attacker could overlay a transparent iframe to perform click hijacking on victims.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-43984

Publication date:
31/10/2024
Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher allows Code Injection.This issue affects Podlove Podcast Publisher: from n/a through 4.1.13.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2025