Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-29031

Publication date:
21/03/2024
Meshery is an open source, cloud native manager that enables the design and management of Kubernetes-based infrastructure and applications. A SQL injection vulnerability in Meshery prior to version 0.7.17 allows a remote attacker to obtain sensitive information via the `order` parameter of `GetMeshSyncResources`. Version 0.7.17 contains a patch for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2025

CVE-2024-2453

Publication date:
21/03/2024
<br /> There is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2024

CVE-2024-2770

Publication date:
21/03/2024
A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/contact-us.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257606 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
21/02/2025

CVE-2024-2773

Publication date:
21/03/2024
A vulnerability classified as problematic has been found in Campcodes Online Marriage Registration System 1.0. This affects an unknown part of the file /user/search.php. The manipulation of the argument searchdata leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257607.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2024-28171

Publication date:
21/03/2024
<br /> It is possible to perform a path traversal attack and write outside of the intended directory. If a file name is specified that already exists on the file system, then the original file will be overwritten.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2024-28045

Publication date:
21/03/2024
<br /> Improper neutralization of input within the affected product could lead to cross-site scripting.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2024-28040

Publication date:
21/03/2024
<br /> SQL injection vulnerability exists in GetDIAE_astListParameters.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2024-25567

Publication date:
21/03/2024
<br /> Path traversal attack is possible and write outside of the intended directory and may access sensitive information. If a file name is specified that already exists on the file system, then the original file will be overwritten.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2024-28863

Publication date:
21/03/2024
node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2025

CVE-2023-42954

Publication date:
21/03/2024
A privilege escalation issue existed in FileMaker Server, potentially exposing sensitive information to front-end websites when signed in to the Admin Console with an administrator role. This issue has been fixed in FileMaker Server 20.3.1 by reducing the information sent in requests.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2024-23975

Publication date:
21/03/2024
<br /> SQL injection vulnerability exists in GetDIAE_slogListParameters.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2024-23494

Publication date:
21/03/2024
<br /> SQL injection vulnerability exists in GetDIAE_unListParameters.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025