Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-22257

Publication date:
18/03/2024
In Spring Security, versions 5.7.x prior to 5.7.12, 5.8.x prior to <br /> 5.8.11, versions 6.0.x prior to 6.0.9, versions 6.1.x prior to 6.1.8, <br /> versions 6.2.x prior to 6.2.3, an application is possible vulnerable to <br /> broken access control when it directly uses the AuthenticatedVoter#vote passing a null Authentication parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-1753

Publication date:
18/03/2024
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2024

CVE-2024-2597

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/bookdetail_school_person.php, in the &amp;#39;b_id&amp;#39; parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2598

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/select_send_2.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2599

Publication date:
18/03/2024
File upload restriction evasion vulnerability in AMSS++ version 4.31. This vulnerability could allow an authenticated user to potentially obtain RCE through webshell, compromising the entire infrastructure.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2594

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/admin/index.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2595

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/bookdetail_khet_person.php, in the &amp;#39;b_id&amp;#39; parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2596

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/mail/main/select_send.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2593

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/bookdetail_group.php, in the &amp;#39;b_id&amp;#39; parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2589

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31 that allows SQL injection through /amssplus/modules/book/main/bookdetail_school_person.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the DB.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2590

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31 that allows SQL injection through /amssplus/modules/mail/main/select_send.php, in the &amp;#39;sd_index&amp;#39; parameter. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the DB.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-2591

Publication date:
18/03/2024
Vulnerability in AMSS++ version 4.31 that allows SQL injection through /amssplus/modules/book/main/bookdetail_group.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the DB.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025