Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-41955

Publication date:
31/07/2024
Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view. Update to MobSF v4.0.5.
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2024

CVE-2024-41108

Publication date:
31/07/2024
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host. Otherwise, an error message containing "Invalid tasking!" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings. This vulnerability is fixed in 1.5.10.41.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-41630

Publication date:
31/07/2024
Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2024-40645

Publication date:
31/07/2024
FOG is a cloning/imaging/rescue suite/inventory management system. An improperly restricted file upload feature allows authenticated users to execute arbitrary code on the fogproject server. The Rebranding feature has a check on the client banner image requiring it to be 650 pixels wide and 120 pixels high. Apart from that, there are no checks on things like file extensions. This can be abused by appending a PHP webshell to the end of the image and changing the extension to anything the PHP web server will parse. This vulnerability is fixed in 1.5.10.41.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2023-28149

Publication date:
31/07/2024
An issue was discovered in the IhisiServiceSmm module in Insyde InsydeH2O with kernel 5.2 before 05.28.42, 5.3 before 05.37.42, 5.4 before 05.45.39, 5.5 before 05.53.39, and 5.6 before 05.60.39 that could allow an attacker to modify UEFI variables.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2024

CVE-2024-7324

Publication date:
31/07/2024
A vulnerability was found in IObit iTop Data Recovery Pro 4.4.0.687. It has been declared as critical. Affected by this vulnerability is an unknown functionality in the library madbasic_.bpl of the component BPL Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The associated identifier of this vulnerability is VDB-273247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-23444

Publication date:
31/07/2024
It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2024-6978

Publication date:
31/07/2024
Cato Networks Windows SDP Client Local root certificates can be installed by low-privileged users.This issue affects SDP Client: before 5.10.28.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2024-6977

Publication date:
31/07/2024
A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker's system.This issue affects SDP Client: before 5.10.34.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2024-6973

Publication date:
31/07/2024
Remote Code Execution in Cato Windows SDP client via crafted URLs.<br /> This issue affects Windows SDP Client before 5.10.34.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2024-6974

Publication date:
31/07/2024
Cato Networks Windows SDP Client Local Privilege Escalation via self-upgradeThis issue affects SDP Client: before 5.10.34.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2024-6975

Publication date:
31/07/2024
Cato Networks Windows SDP Client Local Privilege Escalation via openssl configuration file.<br /> This issue affects SDP Client before 5.10.34.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024