Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6632

Publication date:
27/08/2024
A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-6633

Publication date:
27/08/2024
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software.<br /> <br /> The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-7071

Publication date:
27/08/2024
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;), CWE - 564 - SQL Injection: Hibernate vulnerability in Brain Information Technologies Inc. Brain Low-Code allows SQL Injection.This issue affects Brain Low-Code: before 2.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-8182

Publication date:
27/08/2024
An Unauthenticated Denial of Service (DoS) vulnerability exists in Flowise version 1.8.2 leading to a complete crash of the instance running a vulnerable version due to improper handling of user supplied input to the “/api/v1/get-upload-file” api endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-7940

Publication date:
27/08/2024
The product exposes a service that is intended for local only to<br /> all network interfaces without any authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2024

CVE-2024-7941

Publication date:
27/08/2024
An HTTP parameter may contain a URL value and could cause<br /> the web application to redirect the request to the specified URL.<br /> By modifying the URL value to a malicious site, an attacker may<br /> successfully launch a phishing scam and steal user credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-8181

Publication date:
27/08/2024
An Authentication Bypass vulnerability exists in Flowise version 1.8.2. This could allow a remote, unauthenticated attacker to access API endpoints as an administrator and allow them to access restricted functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2024

CVE-2024-3980

Publication date:
27/08/2024
The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names<br /> that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or<br /> other files that are critical to the application.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-3982

Publication date:
27/08/2024
An attacker with local access to machine where MicroSCADA X<br /> SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level<br /> is not enabled and only users with administrator rights can enable it.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-4872

Publication date:
27/08/2024
A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability<br /> an attacker must have a valid credential.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-8207

Publication date:
27/08/2024
In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.<br /> <br /> Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2024-8197

Publication date:
27/08/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-7859. Reason: This candidate is a reservation duplicate of CVE-2024-7859. Notes: All CVE users should reference CVE-2024-7859 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
04/10/2024