Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-40763

Publication date:
05/12/2024
Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2024-12227

Publication date:
05/12/2024
A vulnerability, which was classified as problematic, was found in MSI Dragon Center up to 2.0.146.0. This affects the function MmUnMapIoSpace in the library NTIOLib_X64.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. Upgrading to version 2.0.148.0 is able to address this issue. It is recommended to upgrade the affected component.
Severity CVSS v4.0: MEDIUM
Last modification:
05/12/2024

CVE-2024-6515

Publication date:
05/12/2024
Web browser interface may manipulate application username/password in clear text or Base64 encoding providing a higher probability of unintended credentails exposure. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-6516

Publication date:
05/12/2024
Cross Site Scripting vulnerabilities where found providing a potential for malicious scripts to be injected into a client browser. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-6784

Publication date:
05/12/2024
Server-Side Request Forgery vulnerabilities were found providing a potential for access to unauthorized resources and unintended information disclosure. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
10/04/2025

CVE-2024-54126

Publication date:
05/12/2024
This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this vulnerability by uploading and executing malicious firmware which could lead to complete compromise of the targeted device.
Severity CVSS v4.0: HIGH
Last modification:
05/12/2024

CVE-2024-54127

Publication date:
05/12/2024
This vulnerability exists in the TP-Link Archer C50 due to presence of terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the UART shell on the vulnerable device. Successful exploitation of this vulnerability could allow the attacker to obtain Wi-Fi credentials of the targeted system.
Severity CVSS v4.0: MEDIUM
Last modification:
05/12/2024

CVE-2024-51546

Publication date:
05/12/2024
Credentials Disclosure vulnerabilities allow access to on board project back-up bundles. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
10/04/2025

CVE-2024-51548

Publication date:
05/12/2024
Dangerous File Upload vulnerabilities allow upload of malicious scripts. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-51549

Publication date:
05/12/2024
Absolute File Traversal vulnerabilities allows access and modification of un-intended resources. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-51550

Publication date:
05/12/2024
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-51551

Publication date:
05/12/2024
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.07.02; <br /> NEXUS Series v3.07.02; <br /> MATRIX Series v3.07.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025