Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-33008

Publication date:
14/05/2024
SAP Replication Server allows an attacker to use gateway for executing some commands to RSSD. This could result in crashing the Replication Server due to memory corruption with high impact on Availability of the system.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-33009

Publication date:
14/05/2024
SAP Global Label Management is vulnerable to SQL injection. On exploitation the attacker can use specially crafted inputs to modify database commands resulting in the retrieval of additional information persisted by the system. This could lead to low impact on Confidentiality and Integrity of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2024

CVE-2024-33489

Publication date:
14/05/2024
A vulnerability has been identified in Solid Edge (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2025

CVE-2024-33006

Publication date:
14/05/2024
<br /> An unauthenticated attacker can upload a malicious file to the server which when accessed by a victim can allow an attacker to completely compromise system. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2024

CVE-2024-33007

Publication date:
14/05/2024
PDFViewer is a control delivered as part of SAPUI5 product which shows the PDF content in an embedded mode by default. If a PDF document contains embedded JavaScript (or any harmful client-side script), the PDFViewer will execute the JavaScript embedded in the PDF which can cause a potential security threat.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-33000

Publication date:
14/05/2024
SAP Bank Account Management does not perform necessary authorization check for an authorized user, resulting in escalation of privileges. As a result, it has a low impact to confidentiality to the system.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2024

CVE-2024-33002

Publication date:
14/05/2024
Document Service handler (obsolete) in Data Provisioning Service does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability with low impact on Confidentiality and Integrity of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2024

CVE-2024-33004

Publication date:
14/05/2024
SAP Business Objects Business Intelligence Platform is vulnerable to Insecure Storage as dynamic web pages are getting cached even after logging out. On successful exploitation, the attacker can see the sensitive information through cache and can open the pages causing limited impact on Confidentiality, Integrity and Availability of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2024-32742

Publication date:
14/05/2024
A vulnerability has been identified in SIMATIC CN 4100 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2025

CVE-2024-32977

Publication date:
14/05/2024
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.0 contain a vulnerability that allows an unauthenticated attacker to completely bypass the authentication if the `autologinLocal` option is enabled within `config.yaml`, even if they come from networks that are not configured as `localNetworks`, spoofing their IP via the `X-Forwarded-For` header. If autologin is not enabled, this vulnerability does not have any impact. The vulnerability has been patched in version 1.10.1. Until the patch has been applied, OctoPrint administrators who have autologin enabled on their instances should disable it and/or to make the instance inaccessible from potentially hostile networks like the internet.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-32740

Publication date:
14/05/2024
A vulnerability has been identified in SIMATIC CN 4100 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2025

CVE-2024-32741

Publication date:
14/05/2024
A vulnerability has been identified in SIMATIC CN 4100 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2025