Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-0530

Publication date:
17/01/2025
A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/_feedback_system.php. The manipulation of the argument type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
17/01/2025

CVE-2025-0529

Publication date:
17/01/2025
A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
17/01/2025

CVE-2024-50967

Publication date:
17/01/2025
The /rest/rights/ REST API endpoint in Becon DATAGerry through 2.2.0 contains an Incorrect Access Control vulnerability. An attacker can remotely access this endpoint without authentication, leading to unauthorized disclosure of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2025

CVE-2025-0528

Publication date:
17/01/2025
A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and AC18 16.03.10.20. Affected by this issue is some unknown functionality of the file /goform/telnet of the component HTTP Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
28/05/2025

CVE-2025-0527

Publication date:
17/01/2025
A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Severity CVSS v4.0: MEDIUM
Last modification:
17/01/2025

CVE-2024-13503

Publication date:
17/01/2025
Buffer Copy without Checking Size of Input (&amp;#39;Classic Buffer Overflow&amp;#39;) vulnerability in Newtec NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM (Updating signaling process in the swdownload binary modules) allows Local Execution of Code, Remote Code Inclusion.<br /> This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The issue is both present on the PowerPC versions of the modem and the ARM versions.<br /> <br /> A stack buffer buffer overflow in the swdownload binary allows attackers to execute arbitrary code. The parse_INFO function uses an unrestricted `sscanf` to read a string of an incoming network packet into a statically sized buffer.
Severity CVSS v4.0: CRITICAL
Last modification:
17/01/2025

CVE-2024-13502

Publication date:
17/01/2025
Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS Command Injection&amp;#39;) vulnerability in Newtec/iDirect NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM allows Local Code Inclusion.This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19.<br /> <br /> <br /> The `commit_multicast` page used to configure multicasts in the modem&amp;#39;s web administration interface uses improperly parses incoming data from the request before passing it to an `eval` statement in a bash script. This allows attackers to inject arbitrary shell commands.
Severity CVSS v4.0: CRITICAL
Last modification:
17/01/2025

CVE-2024-10498

Publication date:
17/01/2025
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that<br /> could allow an unauthorized attacker to modify configuration values outside of the normal range when the<br /> attacker sends specific Modbus write packets to the device which could result in invalid data or loss of web<br /> interface functionality.
Severity CVSS v4.0: MEDIUM
Last modification:
17/01/2025

CVE-2024-12142

Publication date:
17/01/2025
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists that could<br /> cause information disclosure of restricted web page, modification of web page and denial of<br /> service when specific web pages are modified and restricted functions are invoked.
Severity CVSS v4.0: HIGH
Last modification:
17/01/2025

CVE-2024-12703

Publication date:
17/01/2025
CWE-502: Deserialization of untrusted data vulnerability exists that could lead to loss of confidentiality, integrity<br /> and potential remote code execution on workstation when a non-admin authenticated user opens a malicious<br /> project file.
Severity CVSS v4.0: HIGH
Last modification:
17/01/2025

CVE-2024-10497

Publication date:
17/01/2025
CWE-639: Authorization Bypass Through User-Controlled Key vulnerability exists that could allow an<br /> authorized attacker to modify values outside those defined by their privileges (Elevation of Privileges) when the<br /> attacker sends modified HTTPS requests to the device.
Severity CVSS v4.0: HIGH
Last modification:
17/01/2025

CVE-2024-12476

Publication date:
17/01/2025
CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could<br /> cause information disclosure, impacts workstation integrity and potential remote code execution on the<br /> compromised computer, when specific crafted XML file is imported in the Web Designer configuration tool.
Severity CVSS v4.0: HIGH
Last modification:
17/01/2025