Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-52777

Publication date:
29/11/2024
DCME-320
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2024-52778

Publication date:
29/11/2024
DCME-320
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2024-52779

Publication date:
29/11/2024
DCME-320
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2024-52780

Publication date:
29/11/2024
DCME-320
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2024-36671

Publication date:
29/11/2024
nodemcu before v3.0.0-release_20240225 was discovered to contain an integer overflow via the getnum function at /modules/struct.c.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2024

CVE-2024-48406

Publication date:
29/11/2024
Buffer Overflow vulnerability in SunBK201 umicat through v.0.3.2 and fixed in v.0.3.3 allows an attacker to execute arbitrary code via the power(uct_int_t x, uct_int_t n) in src/uct_upstream.c.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2024

CVE-2024-11992

Publication date:
29/11/2024
Absolute path traversal vulnerability in Quick.CMS, version 6.7, the exploitation of which could allow remote users to bypass the intended restrictions and download any file if it has the appropriate permissions outside of documentroot configured on the server via the aDirFiles%5B0%5D parameter in the admin.php page. This vulnerability allows an attacker to delete files stored on the server due to a lack of proper verification of user-supplied input.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2024

CVE-2024-11990

Publication date:
29/11/2024
A Cross-Site Scripting (XSS) vulnerability in SurgeMail v78c2 could allow an attacker to execute arbitrary JavaScript code via an elaborate payload injected into vulnerable parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2024

CVE-2024-47094

Publication date:
29/11/2024
Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions
Severity CVSS v4.0: MEDIUM
Last modification:
03/12/2024

CVE-2024-50357

Publication date:
29/11/2024
FutureNet NXR series routers provided by Century Systems Co., Ltd. have REST-APIs, which are configured as disabled in the initial (factory default) configuration. But, REST-APIs are unexpectedly enabled when the affected product is powered up, provided either http-server (GUI) or Web authentication is enabled. The factory default configuration makes http-server (GUI) enabled, which means REST-APIs are also enabled. The username and the password for REST-APIs are configured in the factory default configuration. As a result, an attacker may obtain and/or alter the affected product's settings via REST-APIs.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2024

CVE-2024-9044

Publication date:
29/11/2024
A XML External Entity (XXE) vulnerability has been identified in Easy Tax Client Software 2023 1.2 and earlier across multiple platforms, including Windows, Linux, and macOS.
Severity CVSS v4.0: MEDIUM
Last modification:
29/11/2024

CVE-2024-11482

Publication date:
29/11/2024
A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API and enables remote code execution through command injection, executed as the root user.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025