Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-20395

Publication date:
17/07/2024
A vulnerability in the media retrieval functionality of Cisco Webex App could allow an unauthenticated, adjacent attacker to gain access to sensitive session information.<br /> <br /> This vulnerability is due to insecure transmission of requests to backend services when the app accesses embedded media, such as images. An attacker could exploit this vulnerability by sending a message with embedded media that is stored on a messaging server to a targeted user. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture session token information from insecurely transmitted requests and possibly reuse the captured session information to take further actions as the targeted user.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2025

CVE-2024-6830

Publication date:
17/07/2024
A vulnerability, which was classified as critical, was found in SourceCodester Simple Inventory Management System 1.0. Affected is an unknown function of the file action.php of the component Order Handler. The manipulation of the argument order_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271812.
Severity CVSS v4.0: MEDIUM
Last modification:
17/10/2024

CVE-2023-4976

Publication date:
17/07/2024
A flaw exists in FlashBlade whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array.
Severity CVSS v4.0: CRITICAL
Last modification:
10/04/2025

CVE-2024-29120

Publication date:
17/07/2024
In Streampark (version
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2025

CVE-2024-6833

Publication date:
17/07/2024
A vulnerability in Zowe CLI allows local, privileged actors to store previously entered secure credentials in a plaintext file as part of an auto-init operation.
Severity CVSS v4.0: Pending analysis
Last modification:
18/07/2024

CVE-2024-6834

Publication date:
17/07/2024
A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe&amp;#39;s client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-23475

Publication date:
17/07/2024
The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-28074

Publication date:
17/07/2024
It was discovered that a previous vulnerability was not completely fixed with SolarWinds Access Rights Manager. While some controls were implemented the researcher was able to bypass these and use a different method to exploit the vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024

CVE-2024-28992

Publication date:
17/07/2024
The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2024

CVE-2024-28993

Publication date:
17/07/2024
The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2024

CVE-2024-23470

Publication date:
17/07/2024
The SolarWinds Access Rights Manager was found to be susceptible to a pre-authentication remote code execution vulnerability. If exploited, this vulnerability allows an unauthenticated user to run commands and executables.
Severity CVSS v4.0: Pending analysis
Last modification:
11/09/2024

CVE-2024-23471

Publication date:
17/07/2024
The SolarWinds Access Rights Manager was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service resulting in remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2024