Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-22024

Publication date:
13/02/2024
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2024-24742

Publication date:
13/02/2024
SAP CRM WebClient UI - version S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to integrity of the application data after successful exploitation. There is no impact on confidentiality and availability.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-24743

Publication date:
13/02/2024
SAP NetWeaver AS Java (CAF - Guided Procedures) - version 7.50, allows an unauthenticated attacker to submit a malicious request with a crafted XML file over the network, which when parsed will enable him to access sensitive files and data but not modify them. There are expansion limits in place so that availability is not affected.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-25642

Publication date:
13/02/2024
Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensitive information. There is no impact on the availability of the system.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-22130

Publication date:
13/02/2024
Print preview option in SAP CRM WebClient UI - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. An attacker with low privileges can cause limited impact to confidentiality and integrity of the appliaction data after successful exploitation.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-22131

Publication date:
13/02/2024
In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-22132

Publication date:
13/02/2024
SAP IDES ECC-systems contain code that permits the execution of arbitrary program code of user&amp;#39;s choice.An attacker can therefore control the behaviour of the system by executing malicious code which can potentially escalate privileges with low impact on confidentiality, integrity and availability of the system.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-24739

Publication date:
13/02/2024
SAP Bank Account Management (BAM) allows an authenticated user with restricted access to use functions which can result in escalation of privileges with low impact on confidentiality, integrity and availability of the application.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-24740

Publication date:
13/02/2024
SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions, allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2023-47218

Publication date:
13/02/2024
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following versions:<br /> QTS 5.1.5.2645 build 20240116 and later<br /> QuTS hero h5.1.5.2647 build 20240118 and later<br /> QuTScloud c5.1.5.2651 and later
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2025

CVE-2023-50358

Publication date:
13/02/2024
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.<br /> <br /> We have already fixed the vulnerability in the following versions:<br /> QTS 5.1.5.2645 build 20240116 and later<br /> QTS 4.5.4.2627 build 20231225 and later<br /> QTS 4.3.6.2665 build 20240131 and later<br /> QTS 4.3.4.2675 build 20240131 and later<br /> QTS 4.3.3.2644 build 20240131 and later<br /> QTS 4.2.6 build 20240131 and later<br /> QuTS hero h5.1.5.2647 build 20240118 and later<br /> QuTS hero h4.5.4.2626 build 20231225 and later<br /> QuTScloud c5.1.5.2651 and later
Severity CVSS v4.0: Pending analysis
Last modification:
10/12/2025

CVE-2024-22126

Publication date:
13/02/2024
The User Admin application of SAP NetWeaver AS for Java - version 7.50, insufficiently validates and improperly encodes the incoming URL parameters before including them into the redirect URL. This results in Cross-Site Scripting (XSS) vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025