Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-44117

Publication date:
10/09/2024
The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-44120

Publication date:
10/09/2024
SAP NetWeaver Enterprise Portal is vulnerable to reflected cross site scripting due to insufficient encoding of user-controlled input. An unauthenticated attacker could craft a malicious URL and trick a user to click it. If the victim clicks on this crafted URL before it times out, then the attacker could read and manipulate user content in the browser.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-44121

Publication date:
10/09/2024
Under certain conditions Statutory Reports in SAP S/4 HANA allows an attacker with basic privileges to access information which would otherwise be restricted. The vulnerability could expose internal user data that should remain confidential. It does not impact the integrity and availability of the application
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-45279

Publication date:
10/09/2024
Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-45280

Publication date:
10/09/2024
Due to insufficient encoding of user-controlled inputs, SAP NetWeaver AS Java allows malicious scripts to be executed in the login application. This has a limited impact on confidentiality and integrity of the application. There is no impact on availability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-0067

Publication date:
10/09/2024
Marinus Pfund, member of the AXIS OS Bug Bounty Program, <br /> has found the VAPIX API ledlimit.cgi was vulnerable for path traversal attacks allowing to list folder/file names on the local file system of the Axis device. <br /> Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2024

CVE-2024-21528

Publication date:
10/09/2024
All versions of the package node-gettext are vulnerable to Prototype Pollution via the addTranslations() function in gettext.js due to improper user input sanitization.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-41728

Publication date:
10/09/2024
Due to missing authorization check, SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker logged in as a developer to read objects contained in a package. This causes an impact on confidentiality, as this attacker would otherwise not have access to view these objects.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2024-44112

Publication date:
10/09/2024
Due to missing authorization check in SAP for Oil &amp; Gas (Transportation and Distribution), an attacker authenticated as a non-administrative user could call a remote-enabled function which will allow them to delete non-sensitive entries in a user data table. There is no effect on confidentiality or availability.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2024-45286

Publication date:
10/09/2024
Due to lack of proper authorization checks when calling user, a function module in obsolete Tobin interface in SAP Production and Revenue Accounting allows unauthorized access that could lead to disclosure of highly sensitive data. There is no impact on integrity or availability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-44114

Publication date:
10/09/2024
SAP NetWeaver Application Server for ABAP and ABAP Platform allow users with high privileges to execute a program that reveals data over the network. This results in a minimal impact on confidentiality of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2024-44115

Publication date:
10/09/2024
The RFC enabled function module allows a low privileged user to add URLs to any user&amp;#39;s workplace favourites. This vulnerability could be utilized to identify usernames and access information about targeted user&amp;#39;s workplaces, and nodes. There is low impact on integrity of the application
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024