Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-31280

Publication date:
21/12/2024
An AirVantage online Warranty Checker tool vulnerability could allow an attacker to <br /> perform bulk enumeration of IMEI and Serial Numbers pairs. The AirVantage Warranty Checker is updated to no longer return the IMEI and Serial <br /> Number in addition to the warranty status when the Serial Number or IMEI is used to look up <br /> warranty status.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2024

CVE-2024-11811

Publication date:
20/12/2024
The Feedify – Web Push Notifications plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the &amp;#39;platform&amp;#39;, &amp;#39;phone&amp;#39;, &amp;#39;email&amp;#39;, and &amp;#39;store_url&amp;#39; parameters. in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
20/12/2024

CVE-2021-40959

Publication date:
20/12/2024
A reflected cross-site scripting vulnerability in MONITORAPP Application Insight Web Application Firewall (AIWAF)
Severity CVSS v4.0: Pending analysis
Last modification:
25/12/2024

CVE-2024-12845

Publication date:
20/12/2024
A vulnerability classified as problematic was found in Emlog Pro up to 2.4.1. Affected by this vulnerability is an unknown functionality in the library /include/lib/common.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
07/01/2025

CVE-2020-13712

Publication date:
20/12/2024
A command injection is possible through the user interface, allowing arbitrary command execution as <br /> the root user. oMG2000 running MGOS 3.15.1 or earlier is affected. <br /> <br /> MG90 running MGOS 4.2.1 or earlier is affected.
Severity CVSS v4.0: Pending analysis
Last modification:
26/12/2024

CVE-2024-56334

Publication date:
20/12/2024
systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2024

CVE-2024-56335

Publication date:
20/12/2024
vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. In affected versions an attacker is capable of updating or deleting groups from an organization given a few conditions: 1. The attacker has a user account in the server. 2. The attacker&amp;#39;s account has admin or owner permissions in an unrelated organization. 3. The attacker knows the target organization&amp;#39;s UUID and the target group&amp;#39;s UUID. Note that this vulnerability is related to group functionality and as such is only applicable for servers who have enabled the `ORG_GROUPS_ENABLED` setting, which is disabled by default. This attack can lead to different situations: 1. Denial of service, the attacker can limit users from accessing the organization&amp;#39;s data by removing their membership from the group. 2. Privilege escalation, if the attacker is part of the victim organization, they can escalate their own privileges by joining a group they wouldn&amp;#39;t normally have access to. For attackers that aren&amp;#39;t part of the organization, this shouldn&amp;#39;t lead to any possible plain-text data exfiltration as all the data is encrypted client side. This vulnerability is patched in Vaultwarden `1.32.7`, and users are recommended to update as soon as possible. If it&amp;#39;s not possible to update to `1.32.7`, some possible workarounds are: 1. Disabling `ORG_GROUPS_ENABLED`, which would disable groups functionality on the server. 2. Disabling `SIGNUPS_ALLOWED`, which would not allow an attacker to create new accounts on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2025

CVE-2024-56357

Publication date:
20/12/2024
grist-core is a spreadsheet hosting server. A user visiting a malicious document or submitting a malicious form could have their account compromised, because it was possible to use the `javascript:` scheme with custom widget URLs and form redirect URLs. This issue has been patched in version 1.3.1. Users are advised to upgrade. Users unable to upgrade should avoid visiting documents or forms prepared by people they do not trust.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2024-56358

Publication date:
20/12/2024
grist-core is a spreadsheet hosting server. A user visiting a malicious document and previewing an attachment could have their account compromised, because JavaScript in an SVG file would be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid previewing attachments in documents prepared by people they do not trust.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2024-56359

Publication date:
20/12/2024
grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2024-55509

Publication date:
20/12/2024
SQL injection vulnerability in CodeAstro Complaint Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via the id parameter of the delete.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-40875

Publication date:
20/12/2024
There is a cross-site scripting vulnerability in the<br /> management console of Absolute Secure Access prior to version 13.52. Attackers<br /> with system administrator permissions can interfere with another system<br /> administrator’s use of the management console when the second administrator logs<br /> in. Attack complexity is high, attack requirements are present, privileges<br /> required are high, user interaction required is none. The impact to<br /> confidentiality is none, the impact to availability is low, and the impact to<br /> system integrity is high.
Severity CVSS v4.0: MEDIUM
Last modification:
20/12/2024