Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-0782

Publication date:
22/01/2024
A vulnerability has been found in CodeAstro Online Railway Reservation System 1.0 and classified as problematic. This vulnerability affects unknown code of the file pass-profile.php. The manipulation of the argument First Name/Last Name/User Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251698 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-0778

Publication date:
22/01/2024
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in Uniview ISC 2500-S up to 20210930. Affected by this issue is the function setNatConfig of the file /Interface/DevManage/VM.php. The manipulation of the argument natAddress/natPort/natServerPort leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251696. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-0781

Publication date:
22/01/2024
A vulnerability, which was classified as problematic, was found in CodeAstro Internet Banking System 1.0. This affects an unknown part of the file pages_client_signup.php. The manipulation of the argument Client Full Name with the input leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251697 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-22895

Publication date:
22/01/2024
DedeCMS 5.7.112 has a File Upload vulnerability via uploads/dede/module_upload.php.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025

CVE-2023-44395

Publication date:
22/01/2024
Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2024

CVE-2024-0706

Publication date:
22/01/2024
Rejected reason: ***REJECT*** This was a false positive report.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2024

CVE-2020-36772

Publication date:
22/01/2024
CloudLinux CageFS 7.0.8-2 or below insufficiently restricts file paths supplied to the sendmail proxy command. This allows local users to read and write arbitrary files of certain file formats outside the CageFS environment.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2020-36771

Publication date:
22/01/2024
CloudLinux CageFS 7.1.1-1 or below passes the authentication token as a command line argument. In some configurations this allows local users to view the authentication token via the process list and gain code execution as another user.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-0775

Publication date:
22/01/2024
A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2024

CVE-2024-22233

Publication date:
22/01/2024
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.<br /> <br /> Specifically, an application is vulnerable when all of the following are true:<br /> <br /> * the application uses Spring MVC<br /> * Spring Security 6.1.6+ or 6.2.1+ is on the classpath<br /> <br /> <br /> Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-52354

Publication date:
22/01/2024
chasquid before 1.13 allows SMTP smuggling because LF-terminated lines are accepted.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2017-20189

Publication date:
22/01/2024
In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025