Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-33793

Publication date:
03/05/2024
netis-systems MEX605 v2.00.06 allows attackers to execute arbitrary OS commands via a crafted payload to the ping test page.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2020-4874

Publication date:
03/05/2024
IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 190837.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2021-20450

Publication date:
03/05/2024
IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 196640.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2024-28519

Publication date:
03/05/2024
A kernel handle leak issue in ProcObsrvesx.sys 4.0.0.49 in MicroWorld Technologies Inc eScan Antivirus could allow privilege escalation for low-privileged users.
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2024

CVE-2024-31636

Publication date:
03/05/2024
An issue in LIEF v.0.14.1 allows a local attacker to obtain sensitive information via the name parameter of the machd_reader.c component.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2025

CVE-2024-33789

Publication date:
03/05/2024
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the ipurl parameter at /API/info form endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2025

CVE-2024-30851

Publication date:
03/05/2024
Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v.1.0.1 allows an attacker to obtain sensitive information via the download_file.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2025

CVE-2024-33398

Publication date:
03/05/2024
There is a ClusterRole in piraeus-operator v2.5.0 and earlier which has been granted list secrets permission, which allows an attacker to impersonate the service account bound to this ClusterRole and use its high-risk privileges to list confidential information across the cluster.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-34447

Publication date:
03/05/2024
An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2024-34449

Publication date:
03/05/2024
Vditor 3.10.3 allows XSS via an attribute of an A element. NOTE: the vendor indicates that a user is supposed to mitigate this via sanitize=true.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2025

CVE-2023-37407

Publication date:
03/05/2024
IBM Aspera Orchestrator 4.0.1 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 260116.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2022-48696

Publication date:
03/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> regmap: spi: Reserve space for register address/padding<br /> <br /> Currently the max_raw_read and max_raw_write limits in regmap_spi struct<br /> do not take into account the additional size of the transmitted register<br /> address and padding. This may result in exceeding the maximum permitted<br /> SPI message size, which could cause undefined behaviour, e.g. data<br /> corruption.<br /> <br /> Fix regmap_get_spi_bus() to properly adjust the above mentioned limits<br /> by reserving space for the register address/padding as set in the regmap<br /> configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025