Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52628

Publication date:
28/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nftables: exthdr: fix 4-byte stack OOB write<br /> <br /> If priv-&gt;len is a multiple of 4, then dst[len / 4] can write past<br /> the destination array which leads to stack corruption.<br /> <br /> This construct is necessary to clean the remainder of the register<br /> in case -&gt;len is NOT a multiple of the register size, so make it<br /> conditional just like nft_payload.c does.<br /> <br /> The bug was added in 4.1 cycle and then copied/inherited when<br /> tcp/sctp and ip option support was added.<br /> <br /> Bug reported by Zero Day Initiative project (ZDI-CAN-21950,<br /> ZDI-CAN-21951, ZDI-CAN-21961).
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-2890

Publication date:
28/03/2024
Unrestricted Upload of File with Dangerous Type vulnerability in Tumult Inc. Tumult Hype Animations.This issue affects Tumult Hype Animations: from n/a through 1.9.12.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2024

CVE-2024-29241

Publication date:
28/03/2024
Missing authorization vulnerability in System webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to obtain non-sensitive information, write sensitive configurations in DSM, and reboot or shutdown NAS via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2025

CVE-2024-29240

Publication date:
28/03/2024
Missing authorization vulnerability in LayoutSave webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29239

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Recording.CountByCategory webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29237

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in ActionRule.Delete webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29238

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Log.CountByCategory webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29236

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in AudioPattern.Delete webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29235

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in IOModule.EnumLog webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29233

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Emap.Delete webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29234

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Group.Save webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025

CVE-2024-29232

Publication date:
28/03/2024
Improper neutralization of special elements used in an SQL command (&amp;#39;SQL Injection&amp;#39;) vulnerability in Alert.Enum webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2025