Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-38535

Publication date:
13/03/2024
Use of Hard-coded Cryptographic Key vulnerability in OpenText™ Exceed Turbo X affecting versions 12.5.1 and 12.5.2. The vulnerability could compromise the cryptographic keys.  
Severity CVSS v4.0: Pending analysis
Last modification:
10/03/2025

CVE-2023-38536

Publication date:
13/03/2024
HTML injection in OpenText™ Exceed Turbo X affecting version 12.5.1. The vulnerability could result in Cross site scripting.  
Severity CVSS v4.0: Pending analysis
Last modification:
10/03/2025

CVE-2020-11862

Publication date:
13/03/2024
Allocation of Resources Without Limits or Throttling vulnerability in OpenText NetIQ Privileged Account Manager on Linux, Windows, 64 bit allows Flooding.This issue affects NetIQ Privileged Account Manager: before 3.7.0.2.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
10/03/2025

CVE-2024-28193

Publication date:
13/03/2024
your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2024-28662

Publication date:
13/03/2024
A Cross Site Scripting vulnerability exists in Piwigo before 14.3.0 script because of missing sanitization in create_tag in admin/include/functions.php.
Severity CVSS v4.0: Pending analysis
Last modification:
23/05/2025

CVE-2024-28175

Publication date:
13/03/2024
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Due to the improper URL protocols filtering of links specified in the `link.argocd.argoproj.io` annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim&amp;#39;s permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. A patch for this vulnerability has been released in Argo CD versions v2.10.3 v2.9.8, and v2.8.12. There are no completely-safe workarounds besides upgrading. The safest alternative, if upgrading is not possible, would be to create a Kubernetes admission controller to reject any resources with an annotation starting with link.argocd.argoproj.io or reject the resource if the value use an improper URL protocol. This validation will need to be applied in all clusters managed by ArgoCD.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2024-28192

Publication date:
13/03/2024
your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2024-27102

Publication date:
13/03/2024
Wings is the server control plane for Pterodactyl Panel. This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can potentially be used to access files and directories on the host system. The full scope of impact is exactly unknown, but reading files outside of a server&amp;#39;s base directory (sandbox root) is possible. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. Details on the exploitation of this vulnerability are embargoed until March 27th, 2024 at 18:00 UTC. In order to mitigate this vulnerability, a full rewrite of the entire server filesystem was necessary. Because of this, the size of the patch is massive, however effort was made to reduce the amount of breaking changes. Users are advised to update to version 1.11.9. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-24105

Publication date:
13/03/2024
SQL Injection vulnerability in Code-projects Computer Science Time Table System 1.0 allows attackers to run arbitrary code via adminFormvalidation.php.
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-25250

Publication date:
13/03/2024
SQL Injection vulnerability in code-projects Agro-School Management System 1.0 allows attackers to run arbitrary code via the Login page.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2024-27097

Publication date:
13/03/2024
A user endpoint didn&amp;#39;t perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2025

CVE-2024-22167

Publication date:
13/03/2024
A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user&amp;#39;s vault or has already gained access into a user&amp;#39;s system. This attack is limited to the system in context and cannot be propagated.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026