Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-5163

Publication date:
17/06/2024
Improper permission settings for mobile applications (com.transsion.carlcare) may lead to user password and account security risks.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-6044

Publication date:
17/06/2024
Certain models of D-Link wireless routers have a path traversal vulnerability. Unauthenticated attackers on the same local area network can read arbitrary system files by manipulating the URL.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2024

CVE-2024-6043

Publication date:
17/06/2024
A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects the function login of the file admin_class.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268767.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024

CVE-2024-6042

Publication date:
17/06/2024
A vulnerability was found in itsourcecode Real Estate Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file property-detail.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268766 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2024

CVE-2024-6041

Publication date:
16/06/2024
A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268765 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2024

CVE-2024-34451

Publication date:
16/06/2024
Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forwarded-For headers.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-6039

Publication date:
16/06/2024
A vulnerability, which was classified as critical, was found in Feng Office 3.11.1.2. Affected is an unknown function of the component Workspaces. The manipulation of the argument dim leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268752.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024

CVE-2023-27636

Publication date:
16/06/2024
Progress Sitefinity before 15.0.0 allows XSS by authenticated users via the content form in the SF Editor.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2024

CVE-2024-38396

Publication date:
16/06/2024
An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-38461

Publication date:
16/06/2024
irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-38462

Publication date:
16/06/2024
iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-38465

Publication date:
16/06/2024
Shenzhen Guoxin Synthesis image system before 8.3.0 allows username enumeration because of the response discrepancy of incorrect versus error.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025