Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-51550

Publication date:
05/12/2024
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-51551

Publication date:
05/12/2024
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.07.02; <br /> NEXUS Series v3.07.02; <br /> MATRIX Series v3.07.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-51554

Publication date:
05/12/2024
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-51555

Publication date:
05/12/2024
Default Credentail vulnerabilities allows access to an Aspect device using publicly available default credentials since the system does not require the installer to change default credentials. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.07.02; <br /> NEXUS Series v3.07.02; <br /> MATRIX Series v3.07.02
Severity CVSS v4.0: CRITICAL
Last modification:
28/08/2025

CVE-2024-48847

Publication date:
05/12/2024
MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application dependency calculates or validates MD5 checksum hashes. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.01; <br /> NEXUS Series v3.08.01; <br /> MATRIX Series v3.08.01
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-51541

Publication date:
05/12/2024
Local File Inclusion vulnerabilities allow access to sensitive system information. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-51542

Publication date:
05/12/2024
Configuration Download vulnerabilities allow access to dependency configuration information. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
10/04/2025

CVE-2024-51543

Publication date:
05/12/2024
Information Disclosure vulnerabilities allow access to application configuration information. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-51544

Publication date:
05/12/2024
Service Control vulnerabilities allow access to service restart requests and vm configuration settings. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
10/04/2025

CVE-2024-51545

Publication date:
05/12/2024
Username Enumeration vulnerabilities allow access to application level username add, delete, modify and list functions. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-48839

Publication date:
05/12/2024
Improper Input Validation vulnerability allows Remote Code Execution. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
05/12/2024

CVE-2024-48840

Publication date:
05/12/2024
Unauthorized Access vulnerabilities allow Remote Code Execution. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025