Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-35387

Publication date:
24/05/2024
TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the http_host parameter in the function loginAuth.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2023-46442

Publication date:
24/05/2024
An infinite loop in the retrieveActiveBody function of Soot before v4.4.1 under Java 8 allows attackers to cause a Denial of Service (DoS).
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2024

CVE-2024-36049

Publication date:
24/05/2024
Aptos Wisal payroll accounting before 7.1.6 uses hardcoded credentials in the Windows client to fetch the complete list of usernames and passwords from the database server, using an unencrypted connection. This allows attackers in a machine-in-the-middle position read and write access to personally identifiable information (PII) and especially payroll data and the ability to impersonate legitimate users with respect to the audit log.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-33427

Publication date:
24/05/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
26/05/2024

CVE-2024-34995

Publication date:
24/05/2024
svnWebUI v1.8.3 was discovered to contain an arbitrary file deletion vulnerability via the dirTemps parameter under com.cym.controller.UserController#importOver. This vulnerability allows attackers to delete arbitrary files via a crafted POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-35395

Publication date:
24/05/2024
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-35396

Publication date:
24/05/2024
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password for telnet in /web_cste/cgi-bin/product.ini, which allows attackers to log in as root.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2023-52880

Publication date:
24/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc<br /> <br /> Any unprivileged user can attach N_GSM0710 ldisc, but it requires<br /> CAP_NET_ADMIN to create a GSM network anyway.<br /> <br /> Require initial namespace CAP_NET_ADMIN to do that.
Severity CVSS v4.0: Pending analysis
Last modification:
17/12/2025

CVE-2024-33809

Publication date:
24/05/2024
PingCAP TiDB v7.5.1 was discovered to contain a buffer overflow vulnerability, which could lead to database crashes and denial of service attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2025

CVE-2024-35339

Publication date:
24/05/2024
Tenda FH1206 V1.2.0.8(8155) was discovered to contain a command injection vulnerability via the mac parameter at ip/goform/WriteFacMac.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2024-35340

Publication date:
24/05/2024
Tenda FH1206 V1.2.0.8(8155) was discovered to contain a command injection vulnerability via the cmdinput parameter at ip/goform/formexeCommand.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2024-35618

Publication date:
24/05/2024
PingCAP TiDB v7.5.1 was discovered to contain a NULL pointer dereference via the component SortedRowContainer.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2025