Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8407

Publication date:
04/09/2024
A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5489e211c99edff1f62efdba. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file cmd/akademy/handler/handlers.go. The manipulation of the argument emailAddress leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-8408

Publication date:
04/09/2024
A vulnerability was found in Linksys WRT54G 4.21.5. It has been rated as critical. Affected by this issue is the function validate_services_port of the file /apply.cgi of the component POST Parameter Handler. The manipulation of the argument services_array leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-7012

Publication date:
04/09/2024
An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2024

CVE-2024-7923

Publication date:
04/09/2024
An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-7834

Publication date:
04/09/2024
A local privilege escalation is caused by Overwolf<br /> loading and executing certain dynamic link library files from a user-writeable<br /> folder in SYSTEM context on launch. This allows an attacker with unprivileged<br /> access to the system to run arbitrary code with SYSTEM privileges by placing a<br /> malicious .dll file in the respective location.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-44383

Publication date:
04/09/2024
WAYOS FBM-291W v19.09.11 is vulnerable to Command Execution via msp_info_htm.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-44400

Publication date:
04/09/2024
A vulnerability was discovered in DI_8400-16.07.26A1, which has been classified as critical. This issue affects the upgrade_filter_asp function in the upgrade_filter.asp file. Manipulation of the path parameter can lead to command injection.
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2024-8413

Publication date:
04/09/2024
Cross Site Scripting (XSS) vulnerability through the action parameter in index.php. Affected product codebase https://github.com/Bioshox/Raspcontrol and forks such as https://github.com/harmon25/raspcontrol . An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload to an authenticated user and partially hijacking their session details.<br /> <br /> References list
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-7821

Publication date:
04/09/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2024

CVE-2024-45195

Publication date:
04/09/2024
Direct Request (&amp;#39;Forced Browsing&amp;#39;) vulnerability in Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 18.12.16.<br /> <br /> Users are recommended to upgrade to version 18.12.16, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2024-45507

Publication date:
04/09/2024
Server-Side Request Forgery (SSRF), Improper Control of Generation of Code (&amp;#39;Code Injection&amp;#39;) vulnerability in Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 18.12.16.<br /> <br /> Users are recommended to upgrade to version 18.12.16, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-7870

Publication date:
04/09/2024
The PixelYourSite – Your smart PIXEL (TAG) &amp; API Manager and the PixelYourSite PRO plugins for WordPress are vulnerable to Sensitive Information Exposure in all versions up to, and including, 9.7.1 and 10.4.2, respectively, through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files, and to delete log files.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2024