Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-30584

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30585

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the deviceId parameter of the saveParentControlInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30586

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security_5g parameter of the formWifiBasicSet function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30587

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the urls parameter of the saveParentControlInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30588

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the schedStartTime parameter of the setSchedWifi function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30589

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability in the entrys parameter of the fromAddressNat function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30590

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the schedEndTime parameter of the setSchedWifi function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30591

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30592

Publication date:
28/03/2024
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the page parameter of the fromAddressNat function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30606

Publication date:
28/03/2024
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the page parameter of the fromDhcpListClient function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30607

Publication date:
28/03/2024
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceId parameter of the saveParentControlInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-29200

Publication date:
28/03/2024
Kimai is a web-based multi-user time-tracking application. The permission `view_other_timesheet` performs differently for the Kimai UI and the API, thus returning unexpected data through the API. When setting the `view_other_timesheet` permission to true, on the frontend, users can only see timesheet entries for teams they are a part of. When requesting all timesheets from the API, however, all timesheet entries are returned, regardless of whether the user shares team permissions or not. This vulnerability is fixed in 2.13.0.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2025