Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-4284

Publication date:
19/05/2024
A vulnerability in mintplex-labs/anything-llm allows for a denial of service (DoS) condition through the modification of a user's `id` attribute to a value of 0. This issue affects the current version of the software, with the latest commit id `57984fa85c31988b2eff429adfc654c46e0c342a`. By exploiting this vulnerability, an attacker, with manager or admin privileges, can render a chosen account completely inaccessible. The application's mechanism for suspending accounts does not provide a means to reverse this condition through the UI, leading to uncontrolled resource consumption. The vulnerability is introduced due to the lack of input validation and sanitization in the user modification endpoint and the middleware's token validation logic. This issue has been addressed in version 1.0.0 of the software.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-5104

Publication date:
19/05/2024
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_grade_wise.php. The manipulation of the argument grade leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-265094 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
05/03/2025

CVE-2024-5103

Publication date:
19/05/2024
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_first_payment.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265093 was assigned to this vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
05/03/2025

CVE-2024-36078

Publication date:
19/05/2024
In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with world-writable file permissions. This allowed a local attacker on the server to modify the gem's files, injecting arbitrary code into Zammad processes (which run with the environment and permissions of the Zammad user).
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2025

CVE-2024-36080

Publication date:
19/05/2024
Westermo EDW-100 devices through 2024-05-03 have a hidden root user account with a hardcoded password that cannot be changed. NOTE: this is a serial-to-Ethernet converter that should not be placed at the edge of the network.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2024

CVE-2024-36081

Publication date:
19/05/2024
Westermo EDW-100 devices through 2024-05-03 allow an unauthenticated user to download a configuration file containing a cleartext password. NOTE: this is a serial-to-Ethernet converter that should not be placed at the edge of the network.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-36076

Publication date:
19/05/2024
Cross-Site WebSocket Hijacking in SysReptor from version 2024.28 to version 2024.30 causes attackers to escalate privileges and obtain sensitive information when a logged-in SysReptor user visits a malicious same-site subdomain in the same browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2025

CVE-2024-36070

Publication date:
19/05/2024
tine before 2023.11.8, when an LDAP backend is used, allows anonymous remote attackers to obtain sensitive authentication information via setup.php because of getRegistryData in Setup/Frontend/Json.php. (An update is also available for the 2022.11 series.)
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-36053

Publication date:
19/05/2024
In the mintupload package through 4.2.0 for Linux Mint, service-name mishandling leads to command injection via shell metacharacters in check_connection, drop_data_received_cb, and Service.remove. A user can modify a service name in a ~/.linuxmint/mintUpload/services/service file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-5101

Publication date:
19/05/2024
A vulnerability was found in SourceCodester Simple Inventory System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file updateproduct.php. The manipulation of the argument ITEM leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265084.
Severity CVSS v4.0: MEDIUM
Last modification:
10/02/2025

CVE-2024-35947

Publication date:
19/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dyndbg: fix old BUG_ON in &gt;control parser<br /> <br /> Fix a BUG_ON from 2009. Even if it looks "unreachable" (I didn&amp;#39;t<br /> really look), lets make sure by removing it, doing pr_err and return<br /> -EINVAL instead.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2024-5100

Publication date:
19/05/2024
A vulnerability was found in SourceCodester Simple Inventory System 1.0. It has been classified as critical. This affects an unknown part of the file tableedit.php. The manipulation of the argument from/to leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265083.
Severity CVSS v4.0: MEDIUM
Last modification:
10/02/2025