Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-0459

Publication date:
12/01/2024
A vulnerability has been found in Blood Bank & Donor Management 5.6 and classified as critical. This vulnerability affects unknown code of the file /admin/request-received-bydonar.php. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250564.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-0460

Publication date:
12/01/2024
A vulnerability was found in code-projects Faculty Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/pages/student-print.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250565 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2024

CVE-2024-22492

Publication date:
12/01/2024
A stored XSS vulnerability exists in JFinalcms 5.0.0 via the /gusetbook/save contact parameter, which allows remote attackers to inject arbitrary web script or HTML.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2024-22493

Publication date:
12/01/2024
A stored XSS vulnerability exists in JFinalcms 5.0.0 via the /gusetbook/save content parameter, which allows remote attackers to inject arbitrary web script or HTML.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-22494

Publication date:
12/01/2024
A stored XSS vulnerability exists in JFinalcms 5.0.0 via the /gusetbook/save mobile parameter, which allows remote attackers to inject arbitrary web script or HTML.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-28897

Publication date:
12/01/2024
The secret value used for access to critical UDS services of the MIB3 infotainment is hardcoded in the firmware.<br /> <br /> Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2024

CVE-2023-28898

Publication date:
12/01/2024
The Real-Time Streaming Protocol implementation in the MIB3 infotainment incorrectly handles requests to /logs URI, when the id parameter equals to zero. This issue allows an attacker connected to the in-vehicle Wi-Fi network to cause denial-of-service of the infotainment system, when the certain preconditions are met.<br /> <br /> Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2024

CVE-2023-49254

Publication date:
12/01/2024
Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-49255

Publication date:
12/01/2024
The router console is accessible without authentication at "data" field, and while a user needs to be logged in in order to modify the configuration, the session state is shared. If any other user is currently logged in, the anonymous user can execute commands in the context of the authenticated one. If the logged in user has administrative privileges, it is possible to use webadmin service configuration commands to create a new admin user with a chosen password.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-49256

Publication date:
12/01/2024
It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-49257

Publication date:
12/01/2024
An authenticated user is able to upload an arbitrary CGI-compatible file using the certificate upload utility and execute it with the root user privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
11/06/2025

CVE-2023-49258

Publication date:
12/01/2024
User browser may be forced to execute JavaScript and pass the authentication cookie to the attacker leveraging the XSS vulnerability located at "/gui/terminal_tool.cgi" in the "data" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025