Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-42455

Publication date:
04/12/2024
A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-11479

Publication date:
04/12/2024
A HTML Injection vulnerability was identified in Issuetrak version 17.1 that could be triggered by an authenticated user. HTML markup could be added to comments of tickets, which when submitted will render in the <br /> emails sent to all users on that ticket.
Severity CVSS v4.0: MEDIUM
Last modification:
04/12/2024

CVE-2024-46624

Publication date:
03/12/2024
An issue in InfoDom Performa 365 v4.0.1 allows authenticated attackers to elevate their privileges to Administrator via a crafted payload sent to /api/users.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2024

CVE-2024-51363

Publication date:
03/12/2024
Insecure deserialization in Hodoku v2.3.0 to v2.3.2 allows attackers to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-53502

Publication date:
03/12/2024
Seecms v4.8 was discovered to contain a SQL injection vulnerability in the SEMCMS_SeoAndTag.php page.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2024-40391

Publication date:
03/12/2024
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2024

CVE-2024-46625

Publication date:
03/12/2024
An authenticated arbitrary file upload vulnerability in the /documentCache/upload endpoint of InfoDom Performa 365 v4.0.1 allows attackers to execute arbitrary code via uploading a crafted SVG file.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-54131

Publication date:
03/12/2024
The Kolide Agent (aka: Launcher) is the lightweight agent designed to work with Kolide&amp;#39;s service. An implementation bug in the Kolide Agent (known as `launcher`) allows for local privilege escalation to the SYSTEM user on Windows 10 and 11. The bug was introduced in version 1.5.3 when launcher started storing upgraded binaries in the ProgramData directory. This move to the new directory meant the launcher root directory inherited default permissions that are not as strict as the previous location. These incorrect default permissions in conjunction with an omitted SystemDrive environmental variable (when launcher starts osqueryd), allows a malicious actor with access to the local Windows device to successfully place an arbitrary DLL into the osqueryd process&amp;#39;s search path. Under some circumstances, this DLL will be executed when osqueryd performs a WMI query. This combination of events could then allow the attacker to escalate their privileges to SYSTEM. Impacted versions include versions &gt;= 1.5.3 and the fix has been released in 1.12.3.
Severity CVSS v4.0: HIGH
Last modification:
03/12/2024

CVE-2024-53672

Publication date:
03/12/2024
A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2024-51772

Publication date:
03/12/2024
An authenticated RCE vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2024-51773

Publication date:
03/12/2024
A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote Attacker to conduct a stored cross-site scripting (XSS) attack. Successful exploitation could enable a threat actor to perform any actions the user is authorized to do, including accessing the user&amp;#39;s data and altering information within the user&amp;#39;s permissions. This could lead to data modification, deletion, or theft, including unauthorized access to files, file deletion, or the theft of session cookies, which an attacker could use to hijack a user&amp;#39;s session.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2024-45757

Publication date:
03/12/2024
An issue was discovered in Centreon centreon-bam 24.04, 23.10, 23.04, and 22.10. SQL injection can occur in the user-settings form. Exploitation is only accessible to authenticated users with high-privileged access.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025