Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-29901

Publication date:
29/03/2024
The AuthKit library for Next.js provides helpers for authentication and session management using WorkOS &amp; AuthKit with Next.js.<br /> A user can reuse an expired session by controlling the `x-workos-session` header. The vulnerability is patched in v0.4.2.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2025

CVE-2023-49231

Publication date:
29/03/2024
An authentication bypass vulnerability was found in Stilog Visual Planning 8. It allows an unauthenticated attacker to receive an administrative API token.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-3081

Publication date:
29/03/2024
A vulnerability was found in EasyCorp EasyAdmin up to 4.8.9. It has been declared as problematic. Affected by this vulnerability is the function Autocomplete of the file assets/js/autocomplete.js of the component Autocomplete. The manipulation of the argument item leads to cross site scripting. The attack can be launched remotely. Upgrading to version 4.8.10 is able to address this issue. The identifier of the patch is 127436e4c3f56276d548070f99e61b7234200a11. It is recommended to upgrade the affected component. The identifier VDB-258613 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2024-30507

Publication date:
29/03/2024
Authorization Bypass Through User-Controlled Key vulnerability in Molongui.This issue affects Molongui: from n/a through 4.7.7.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2024-30508

Publication date:
29/03/2024
Missing Authorization vulnerability in ThimPress WP Hotel Booking.This issue affects WP Hotel Booking: from n/a through 2.0.9.2.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2024-30502

Publication date:
29/03/2024
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in WP Travel Engine.This issue affects WP Travel Engine: from n/a through 5.7.9.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2024-30504

Publication date:
29/03/2024
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in WP Travel Engine.This issue affects WP Travel Engine: from n/a through 5.7.9.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2024-30506

Publication date:
29/03/2024
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Vsourz Digital All In One Redirection allows Stored XSS.This issue affects All In One Redirection: from n/a through 2.2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2024-30505

Publication date:
29/03/2024
Missing Authorization vulnerability in andy_moyle Church Admin church-admin.This issue affects Church Admin: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2024-29202

Publication date:
29/03/2024
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer&amp;#39;s Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-29893

Publication date:
29/03/2024
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, it&amp;#39;s possible to crash the repo server component through an out of memory error by pointing it to a malicious Helm registry. The loadRepoIndex() function in the ArgoCD&amp;#39;s helm package, does not limit the size nor time while fetching the data. It fetches it and creates a byte slice from the retrieved data in one go. If the registry is implemented to push data continuously, the repo server will keep allocating memory until it runs out of it. A patch for this vulnerability has been released in v2.10.3, v2.9.8, and v2.8.12.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2024-29890

Publication date:
29/03/2024
DataLens is a business intelligence and data visualization system. A specifically crafted request allowed the creation of a special chart type with the ability to pass custom javascript code that would later be executed in an unprotected sandbox on subsequent requests to that chart. The problem was fixed in the datalens-ui version `0.1449.0`. Restricting access to the API for creating or modifying charts (`/charts/api/charts/v1/`) would mitigate the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026