Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-35286

Publication date:
21/10/2024
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025

CVE-2024-35287

Publication date:
21/10/2024
A vulnerability in the NuPoint Messenger (NPM) component of Mitel MiCollab through version 9.8 SP1 (9.8.1.5) could allow an authenticated attacker with administrative privilege to conduct a privilege escalation attack due to the execution of a resource with unnecessary privileges. A successful exploit could allow an attacker to execute arbitrary commands with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025

CVE-2024-35314

Publication date:
21/10/2024
A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025

CVE-2024-35315

Publication date:
21/10/2024
A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1.110, and MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25, could allow an authenticated attacker to conduct a privilege escalation attack due to improper file validation. A successful exploit could allow an attacker to run arbitrary code with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025

CVE-2024-40084

Publication date:
21/10/2024
A Buffer Overflow in the Boa webserver of Vilo 5 Mesh WiFi System
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025

CVE-2024-30159

Publication date:
21/10/2024
A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a Stored Cross-Site Scripting (XSS) attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary scripts.
Severity CVSS v4.0: Pending analysis
Last modification:
22/03/2025

CVE-2024-40083

Publication date:
21/10/2024
A Buffer Overflow vulnerabilty in the local_app_set_router_token function of Vilo 5 Mesh WiFi System
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-40085

Publication date:
21/10/2024
A Buffer Overflow vulnerability in the local_app_set_router_wan function of Vilo 5 Mesh WiFi System
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-40086

Publication date:
21/10/2024
A Buffer Overflow vulnerability in the local_app_set_router_wifi_SSID_PWD function of Vilo 5 Mesh WiFi System
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-30157

Publication date:
21/10/2024
A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-30158

Publication date:
21/10/2024
A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-50064

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> zram: free secondary algorithms names<br /> <br /> We need to kfree() secondary algorithms names when reset zram device that<br /> had multi-streams, otherwise we leak memory.<br /> <br /> [senozhatsky@chromium.org: kfree(NULL) is legal]
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2025