Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-7575

Publication date:
25/09/2024
In Progress Telerik UI for WPF versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2024

CVE-2024-7576

Publication date:
25/09/2024
In Progress Telerik UI for WPF versions prior to 2024 Q3 (2024.3.924), a code execution attack is possible through an insecure deserialization vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2024

CVE-2024-4657

Publication date:
25/09/2024
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Talent Software BAP Automation allows Stored XSS.This issue affects BAP Automation: before 30840.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-8546

Publication date:
25/09/2024
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video widget in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-6592

Publication date:
25/09/2024
Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2024-6593

Publication date:
25/09/2024
Incorrect Authorization vulnerability in WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows allows an attacker with network access to execute restricted management commands.<br /> This issue affects Authentication Gateway: through 12.10.2.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2024-6594

Publication date:
25/09/2024
Improper Handling of Exceptional Conditions vulnerability in the WatchGuard Single Sign-On Client on Windows causes the client to crash while handling malformed commands. An attacker with network access to the client could create a denial of service condition for the Single Sign-On service by repeatedly issuing malformed commands.<br /> <br /> This issue affects Single Sign-On Client: through 12.7.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2024

CVE-2024-45817

Publication date:
25/09/2024
In x86&amp;#39;s APIC (Advanced Programmable Interrupt Controller) architecture,<br /> error conditions are reported in a status register. Furthermore, the OS<br /> can opt to receive an interrupt when a new error occurs.<br /> <br /> It is possible to configure the error interrupt with an illegal vector,<br /> which generates an error when an error interrupt is raised.<br /> <br /> This case causes Xen to recurse through vlapic_error(). The recursion<br /> itself is bounded; errors accumulate in the the status register and only<br /> generate an interrupt when a new status bit becomes set.<br /> <br /> However, the lock protecting this state in Xen will try to be taken<br /> recursively, and deadlock.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-7479

Publication date:
25/09/2024
Improper verification of cryptographic signature during installation of a VPN driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-7481

Publication date:
25/09/2024
Improper verification of cryptographic signature during installation of a Printer driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-8858

Publication date:
25/09/2024
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘piechart_settings’ parameter in all versions up to, and including, 8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-31145

Publication date:
25/09/2024
Certain PCI devices in a system might be assigned Reserved Memory<br /> Regions (specified via Reserved Memory Region Reporting, "RMRR") for<br /> Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used<br /> for platform tasks such as legacy USB emulation.<br /> <br /> Since the precise purpose of these regions is unknown, once a device<br /> associated with such a region is active, the mappings of these regions<br /> need to remain continuouly accessible by the device. In the logic<br /> establishing these mappings, error handling was flawed, resulting in<br /> such mappings to potentially remain in place when they should have been<br /> removed again. Respective guests would then gain access to memory<br /> regions which they aren&amp;#39;t supposed to have access to.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024