Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-29201

Publication date:
29/03/2024
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-28867

Publication date:
29/03/2024
Swift Prometheus is a Swift client for the Prometheus monitoring system, supporting counters, gauges and histograms. In code which applies _un-sanitized string values into metric names or labels_, an attacker could make use of this and send a `?lang` query parameter containing newlines, `}` or similar characters which can lead to the attacker taking over the exported format -- including creating unbounded numbers of stored metrics, inflating server memory usage, or causing "bogus" metrics. This vulnerability is fixed in2.0.0-alpha.2.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2024-23537

Publication date:
29/03/2024
Improper Privilege Management vulnerability in Apache Fineract.This issue affects Apache Fineract:
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-23538

Publication date:
29/03/2024
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract:
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-23539

Publication date:
29/03/2024
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Fineract.This issue affects Apache Fineract:
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-30501

Publication date:
29/03/2024
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.9.4.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2025

CVE-2024-30510

Publication date:
29/03/2024
Unrestricted Upload of File with Dangerous Type vulnerability in Salon Booking System Salon booking system.This issue affects Salon booking system: from n/a through 9.5.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2025

CVE-2024-30634

Publication date:
29/03/2024
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the mitInterface parameter in the fromAddressNat function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30635

Publication date:
29/03/2024
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability located in the funcpara1 parameter in the formSetCfm function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30636

Publication date:
29/03/2024
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the PPPOEPassword parameter in the formQuickIndex function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30637

Publication date:
29/03/2024
Tenda F1202 v1.2.0.20(408) has a command injection vulnerablility in the formWriteFacMac function in the mac parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30638

Publication date:
29/03/2024
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the entrys parameter in the fromAddressNat function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025