Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-3040

Publication date:
28/03/2024
A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_crl_conf. The manipulation of the argument CRLId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258429 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2025

CVE-2024-3039

Publication date:
28/03/2024
A vulnerability classified as critical has been found in Shanghai Brad Technology BladeX 3.4.0. Affected is an unknown function of the file /api/blade-user/export-user of the component API. The manipulation with the input updatexml(1,concat(0x3f,md5(123456),0x3f),1)=1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2025

CVE-2024-31135

Publication date:
28/03/2024
In JetBrains TeamCity before 2024.03 open redirect was possible on the login page
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2024

CVE-2024-31137

Publication date:
28/03/2024
In JetBrains TeamCity before 2024.03 reflected XSS was possible via Space connection configuration
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2024

CVE-2024-31138

Publication date:
28/03/2024
In JetBrains TeamCity before 2024.03 xSS was possible via Agent Distribution settings
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2024

CVE-2024-31136

Publication date:
28/03/2024
In JetBrains TeamCity before 2024.03 2FA could be bypassed by providing a special URL parameter
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2024

CVE-2024-31134

Publication date:
28/03/2024
In JetBrains TeamCity before 2024.03 authenticated users without administrative permissions could register other users when self-registration was disabled
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2024

CVE-2024-30604

Publication date:
28/03/2024
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the list1 parameter of the fromDhcpListClient function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30603

Publication date:
28/03/2024
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the urls parameter of the saveParentControlInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30602

Publication date:
28/03/2024
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedStartTime parameter of the setSchedWifi function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30601

Publication date:
28/03/2024
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-30600

Publication date:
28/03/2024
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedEndTime parameter of the setSchedWifi function.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025