Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-7071

Publication date:
27/08/2024
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), CWE - 564 - SQL Injection: Hibernate vulnerability in Brain Information Technologies Inc. Brain Low-Code allows SQL Injection.This issue affects Brain Low-Code: before 2.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-8182

Publication date:
27/08/2024
An Unauthenticated Denial of Service (DoS) vulnerability exists in Flowise version 1.8.2 leading to a complete crash of the instance running a vulnerable version due to improper handling of user supplied input to the “/api/v1/get-upload-file” api endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-7940

Publication date:
27/08/2024
The product exposes a service that is intended for local only to<br /> all network interfaces without any authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2024

CVE-2024-7941

Publication date:
27/08/2024
An HTTP parameter may contain a URL value and could cause<br /> the web application to redirect the request to the specified URL.<br /> By modifying the URL value to a malicious site, an attacker may<br /> successfully launch a phishing scam and steal user credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-8181

Publication date:
27/08/2024
An Authentication Bypass vulnerability exists in Flowise version 1.8.2. This could allow a remote, unauthenticated attacker to access API endpoints as an administrator and allow them to access restricted functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2024

CVE-2024-3980

Publication date:
27/08/2024
The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names<br /> that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or<br /> other files that are critical to the application.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-3982

Publication date:
27/08/2024
An attacker with local access to machine where MicroSCADA X<br /> SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level<br /> is not enabled and only users with administrator rights can enable it.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-4872

Publication date:
27/08/2024
A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability<br /> an attacker must have a valid credential.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-8207

Publication date:
27/08/2024
In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.<br /> <br /> Required Configuration: Only environments with Linux as the underlying operating system is affected by this issue
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2024-8197

Publication date:
27/08/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-7859. Reason: This candidate is a reservation duplicate of CVE-2024-7859. Notes: All CVE users should reference CVE-2024-7859 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
04/10/2024

CVE-2024-7791

Publication date:
27/08/2024
The 140+ Widgets | Xpro Addons For Elementor – FREE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘arrow’ parameter within the Post Grid widget in all versions up to, and including, 1.4.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2024-6789

Publication date:
27/08/2024
A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 and LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6 allows authenticated user to read files
Severity CVSS v4.0: HIGH
Last modification:
23/02/2026