Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6981

Publication date:
27/09/2024
OMNTEC Proteus Tank Monitoring OEL8000III Series<br /> <br /> <br /> could allow an attacker to perform administrative actions without proper authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2024

CVE-2024-8310

Publication date:
27/09/2024
OPW Fuel Management Systems SiteSentinel <br /> could allow an attacker to bypass authentication to the server and obtain full admin privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2024

CVE-2024-46366

Publication date:
27/09/2024
A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025

CVE-2024-46367

Publication date:
27/09/2024
A Stored Cross-Site Scripting (XSS) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to inject arbitrary JavaScript code by submitting a malicious payload within the username field. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025

CVE-2024-22170

Publication date:
27/09/2024
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Western Digital My Cloud ddns-start on Linux allows Overflow Buffers.This issue affects My Cloud: before 5.29.102.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2024

CVE-2024-38809

Publication date:
27/09/2024
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack.<br /> <br /> Users of affected versions should upgrade to the corresponding fixed version.<br /> <br /> Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2024

CVE-2024-47077

Publication date:
27/09/2024
authentik is an open-source identity provider. Prior to versions 2024.8.3 and 2024.6.5, access tokens issued to one application can be stolen by that application and used to impersonate the user against any other proxy provider. Also, a user can steal an access token they were legitimately issued for one application and use it to access another application that they aren&amp;#39;t allowed to access. Anyone who has more than one proxy provider application with different trust domains or different access control is affected. Versions 2024.8.3 and 2024.6.5 fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2025

CVE-2024-6983

Publication date:
27/09/2024
mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-45745

Publication date:
27/09/2024
TopQuadrant TopBraid EDG before version 8.0.1 allows an authenticated attacker to upload an XML DTD file and execute JavaScript to read local files or access URLs (XXE). Fixed in 8.0.1 (bug fix: TBS-6721).
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2024-47070

Publication date:
27/09/2024
authentik is an open-source identity provider. A vulnerability that exists in versions prior to 2024.8.3 and 2024.6.5 allows bypassing password login by adding X-Forwarded-For header with an unparsable IP address, e.g. `a`. This results in a possibility of logging into any account with a known login or email address. The vulnerability requires the authentik instance to trust X-Forwarded-For header provided by the attacker, thus it is not reproducible from external hosts on a properly configured environment. The issue occurs due to the password stage having a policy bound to it, which skips the password stage if the Identification stage is setup to also contain a password stage. Due to the invalid X-Forwarded-For header, which does not get validated to be an IP Address early enough, the exception happens later and the policy fails. The default blueprint doesn&amp;#39;t correctly set `failure_result` to `True` on the policy binding meaning that due to this exception the policy returns false and the password stage is skipped. Versions 2024.8.3 and 2024.6.5 fix this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2025

CVE-2024-45744

Publication date:
27/09/2024
TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker could gain file system access using a separate vulnerability such as CVE-2024-45745. At least version 7.1.3 is affected. Version 7.3 adds HashiCorp Vault integration that does not store external passwords locally. Version 8.3.0 warns when using plain text secrets.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025

CVE-2024-44912

Publication date:
27/09/2024
NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the TM subsystem (crypto_tm.c).
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025