Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-39751

Publication date:
06/08/2024
IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 297429
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2024-23456

Publication date:
06/08/2024
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23458

Publication date:
06/08/2024
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23460

Publication date:
06/08/2024
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23464

Publication date:
06/08/2024
In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23483

Publication date:
06/08/2024
An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2023-28806

Publication date:
06/08/2024
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-7552

Publication date:
06/08/2024
A vulnerability was found in DataGear up to 5.0.0. It has been declared as critical. Affected by this vulnerability is the function evaluateVariableExpression of the file ConversionSqlParamValueMapper.java of the component Data Schema Page. The manipulation leads to improper neutralization of special elements used in an expression language statement. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273697 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-36424

Publication date:
06/08/2024
K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-40101

Publication date:
06/08/2024
A Reflected Cross-site scripting (XSS) vulnerability exists in '/search' in microweber 2.0.15 and earlier allowing unauthenticated remote attackers to inject arbitrary web script or HTML via the 'keywords' parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-41226

Publication date:
06/08/2024
A CSV injection vulnerability in Automation Anywhere Automation 360 version 21094 allows attackers to execute arbitrary code via a crafted payload. NOTE: Automation Anywhere disputes this report, arguing the attacker executes everything from the client side and does not attack the Control Room. The payload is being injected in the http Response from the client-side, so the owner of the Response and payload is the end user in this case. They contend that the server's security controls have no impact or role to play in this situation and therefore this is not a valid vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2024

CVE-2024-41910

Publication date:
06/08/2024
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XSS vulnerabilities in the version of JavaScript used.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025