Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-45722

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x uses weak credential mechanism that could allow an attacker to easily calculate MQTT credentials.
Severity CVSS v4.0: HIGH
Last modification:
10/12/2024

CVE-2024-46874

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow MQTT clients connecting with device credentials to send messages to some topics. Attackers with device credentials could issue commands to other devices on behalf of Ruijie's cloud.
Severity CVSS v4.0: CRITICAL
Last modification:
10/12/2024

CVE-2024-47146

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to obtain the devices serial number if physically adjacent and sniffing the RAW WIFI signal.
Severity CVSS v4.0: HIGH
Last modification:
10/12/2024

CVE-2024-47791

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to subscribe to partial possible topics in Ruijie MQTT broker, and receive partial messages being sent to and from devices.
Severity CVSS v4.0: HIGH
Last modification:
10/12/2024

CVE-2024-48874

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could give attackers the ability to force Ruijie's proxy servers to perform any request the attackers choose. Using this, attackers could access internal services used by Ruijie and their internal cloud infrastructure via AWS cloud metadata services.
Severity CVSS v4.0: CRITICAL
Last modification:
10/12/2024

CVE-2024-52558

Publication date:
06/12/2024
The affected product is vulnerable to an integer underflow. An unauthenticated attacker could send a malformed HTTP request, which could allow the attacker to crash the program.
Severity CVSS v4.0: MEDIUM
Last modification:
06/12/2024

CVE-2024-47547

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a weak mechanism for its users to change their passwords which leaves authentication vulnerable to brute force attacks.
Severity CVSS v4.0: CRITICAL
Last modification:
10/12/2024

CVE-2024-48703

Publication date:
06/12/2024
PhpGurukul Medical Card Generation System v1.0 is vulnerable to Cross Site Scripting (XSS) in /admin/search-medicalcard.php via the searchdata parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-48871

Publication date:
06/12/2024
The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution.
Severity CVSS v4.0: CRITICAL
Last modification:
06/12/2024

CVE-2024-51727

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a feature that could enable attackers to invalidate a legitimate user's session and cause a denial-of-service attack on a user's account.
Severity CVSS v4.0: HIGH
Last modification:
10/12/2024

CVE-2024-52320

Publication date:
06/12/2024
The affected product is vulnerable to a command injection. An unauthenticated attacker could send commands through a malicious HTTP request which could result in remote code execution.
Severity CVSS v4.0: CRITICAL
Last modification:
06/12/2024

CVE-2024-42494

Publication date:
06/12/2024
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x contains a a feature that could enable sub accounts or attackers to view and exfiltrate sensitive information from all cloud accounts registered to Ruijie's services
Severity CVSS v4.0: HIGH
Last modification:
10/12/2024