Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-26643

Publication date:
21/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout<br /> <br /> While the rhashtable set gc runs asynchronously, a race allows it to<br /> collect elements from anonymous sets with timeouts while it is being<br /> released from the commit path.<br /> <br /> Mingi Cho originally reported this issue in a different path in 6.1.x<br /> with a pipapo set with low timeouts which is not possible upstream since<br /> 7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set<br /> element timeout").<br /> <br /> Fix this by setting on the dead flag for anonymous sets to skip async gc<br /> in this case.<br /> <br /> According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on<br /> transaction abort"), Florian plans to accelerate abort path by releasing<br /> objects via workqueue, therefore, this sets on the dead flag for abort<br /> path too.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-29732

Publication date:
21/03/2024
A SQL Injection has been found on SCAN_VISIO eDocument Suite Web Viewer of Abast. This vulnerability allows an unauthenticated user to retrieve, update and delete all the information of database. This vulnerability was found on login page via "user" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2024

CVE-2024-27438

Publication date:
21/03/2024
Download of Code Without Integrity Check vulnerability in Apache Doris.<br /> The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution.<br /> Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check.<br /> This issue affects Apache Doris: from 1.2.0 through 2.0.4.<br /> <br /> Users are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2024-26307

Publication date:
21/03/2024
Possible race condition vulnerability in Apache Doris.<br /> Some of code using `chmod()` method. This method run the risk of someone renaming the file out from under user and chmodding the wrong file.<br /> This could theoretically happen, but the impact would be minimal.<br /> This issue affects Apache Doris: before 1.2.8, before 2.0.4.<br /> <br /> Users are recommended to upgrade to version 2.0.4, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2024-29131

Publication date:
21/03/2024
Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue affects Apache Commons Configuration: from 2.0 before 2.10.1.<br /> <br /> Users are recommended to upgrade to version 2.10.1, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-29133

Publication date:
21/03/2024
Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue affects Apache Commons Configuration: from 2.0 before 2.10.1.<br /> <br /> Users are recommended to upgrade to version 2.10.1, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2025

CVE-2024-1147

Publication date:
21/03/2024
Weak access control in OpenText PVCS Version Manager allows potential bypassing of authentication and download of files.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2024

CVE-2024-1148

Publication date:
21/03/2024
Weak access control in OpenText PVCS Version Manager allows potential bypassing of authentication and uploading of files.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2024

CVE-2024-2754

Publication date:
21/03/2024
A vulnerability classified as critical has been found in SourceCodester Complete E-Commerce Site 1.0. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257544.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2025

CVE-2024-2162

Publication date:
21/03/2024
An OS Command Injection vulnerability in Kiloview NDI allows a low-privileged user to execute arbitrary code remotely on the device with high privileges.<br /> <br /> This issue affects Kiloview NDI N3, N3-s, N4, N20, N30, N40 and was fixed in Firmware version 2.02.0227 .<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2024

CVE-2024-2161

Publication date:
21/03/2024
Use of Hard-coded Credentials in Kiloview NDI allows un-authenticated users to bypass authenticationThis issue affects Kiloview NDI N3, N3-s, N4, N20, N30, N40 and was fixed in Firmware version 2.02.0227 .<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2024

CVE-2024-28835

Publication date:
21/03/2024
A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025