Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-49521

Publication date:
12/11/2024
Adobe Commerce versions 3.2.5 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to a security feature bypass. A low privileged attacker could exploit this vulnerability to send crafted requests from the vulnerable server to internal systems, which could result in the bypassing of security measures such as firewalls. Exploitation of this issue does not require user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2024

CVE-2024-49369

Publication date:
12/11/2024
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2024-30133

Publication date:
12/11/2024
HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a control flow vulnerability. The application does not sufficiently manage its control flow during execution, creating conditions in which the control flow can be modified in unexpected ways.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2024-11005

Publication date:
12/11/2024
Command injection in Ivanti Connect Secure before version 22.7R2.1 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.1 (Not Applicable to 9.1Rx) allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025

CVE-2024-11006

Publication date:
12/11/2024
Command injection in Ivanti Connect Secure before version 22.7R2.1 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1.1 (Not Applicable to 9.1Rx) allows a remote authenticated attacker with admin privileges to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025

CVE-2024-10943

Publication date:
12/11/2024
An<br /> authentication bypass vulnerability exists in the affected product. The<br /> vulnerability exists due to shared secrets across accounts and could allow a threat<br /> actor to impersonate a user if the threat actor is able to enumerate additional<br /> information required during authentication.
Severity CVSS v4.0: CRITICAL
Last modification:
13/11/2024

CVE-2024-10944

Publication date:
12/11/2024
A Remote<br /> Code Execution vulnerability exists in the affected product. The vulnerability requires<br /> a high level of permissions and exists due to improper input validation resulting<br /> in the possibility of a malicious Updated Agent being deployed.
Severity CVSS v4.0: HIGH
Last modification:
13/11/2024

CVE-2024-10945

Publication date:
12/11/2024
A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation.
Severity CVSS v4.0: HIGH
Last modification:
13/11/2024

CVE-2024-11004

Publication date:
12/11/2024
Reflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.
Severity CVSS v4.0: Pending analysis
Last modification:
17/01/2025

CVE-2024-10923

Publication date:
12/11/2024
Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in OpenText™ ALM Octane Management allows Stored XSS. The vulnerability could result in a remote code execution attack. <br /> <br /> This issue affects ALM Octane Management: from 16.2.100 through 24.4.
Severity CVSS v4.0: HIGH
Last modification:
13/11/2024

CVE-2024-52296

Publication date:
12/11/2024
libosdp is an implementation of IEC 60839-11-5 OSDP (Open Supervised Device Protocol) and provides a C library with support for C++, Rust and Python3. At ospd_common.c, on the osdp_reply_name function, any reply id between REPLY_ACK and REPLY_XRD is valid, but names array do not declare all of the range. On a case of an undefined reply id within the range, name will be null (name = names[reply_id - REPLY_ACK];). Null name will casue a crash on next line: if (name[0] == &amp;#39;\0&amp;#39;) as null[0] is invalid. As this logic is not limited to a secure connection, attacker may trigger this vulnerability without any prior knowledge. This issue is fixed in 2.4.0.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2024

CVE-2024-52297

Publication date:
12/11/2024
Tolgee is an open-source localization platform. Tolgee 3.81.1 included the all configuration properties in the PublicConfiguratioDTO publicly exposed to users. This vulnerability is fixed in v3.81.2.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2025