Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-50356

Publication date:
31/10/2024
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-51482

Publication date:
31/10/2024
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.*
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-7883

Publication date:
31/10/2024
When using Arm Cortex-M Security Extensions (CMSE), Secure stack <br /> contents can be leaked to Non-secure state via floating-point registers <br /> when a Secure to Non-secure function call is made that returns a <br /> floating-point value and when this is the first use of floating-point <br /> since entering Secure state. This allows an attacker to read a limited <br /> quantity of Secure stack contents with an impact on confidentiality. <br /> This issue is specific to code generated using LLVM-based compilers.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2024-51478

Publication date:
31/10/2024
YesWiki is a wiki system written in PHP. Prior to 4.4.5, the use of a weak cryptographic algorithm and a hard-coded salt to hash the password reset key allows it to be recovered and used to reset the password of any account. This issue is fixed in 4.4.5.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2025

CVE-2024-51430

Publication date:
31/10/2024
Cross Site Scripting vulnerability in online diagnostic lab management system using php v.1.0 allows a remote attacker to execute arbitrary code via the Test Name parameter on the diagnostic/add-test.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-51481

Publication date:
31/10/2024
Nix is a package manager for Linux and other Unix systems. On macOS, built-in builders (such as `builtin:fetchurl`, exposed to users with `import `) were not executed in the macOS sandbox. Thus, these builders (which are running under the `nixbld*` users) had read access to world-readable paths and write access to world-writable paths outside of the sandbox. This issue is fixed in 2.18.9, 2.19.7, 2.20.9, 2.21.5, 2.22.4, 2.23.4, and 2.24.10. Note that sandboxing is not enabled by default on macOS. The Nix sandbox is not primarily intended as a security mechanism, but as an aid to improve reproducibility and purity of Nix builds. However, sandboxing *can* mitigate the impact of other security issues by limiting what parts of the host system a build has access to.
Severity CVSS v4.0: LOW
Last modification:
15/04/2026

CVE-2024-51255

Publication date:
31/10/2024
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-51260

Publication date:
31/10/2024
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-8185

Publication date:
31/10/2024
Vault Community and Vault Enterprise (“Vault”) clusters using Vault’s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.<br /> <br /> This vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2024-50354

Publication date:
31/10/2024
gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2024-8553

Publication date:
31/10/2024
A vulnerability was found in Foreman&amp;#39;s loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman&amp;#39;s database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-48910

Publication date:
31/10/2024
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify was vulnerable to prototype pollution. This vulnerability is fixed in 2.4.2.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025