Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-22125

Publication date:
09/01/2024
Under certain conditions the Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge) - version 1.0, allows an attacker to access highly sensitive information which would otherwise be restricted causing high impact on confidentiality.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/01/2024

CVE-2023-51717

Publication date:
09/01/2024
Dataiku DSS before 11.4.5 and 12.4.1 has Incorrect Access Control that could lead to a full authentication bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2024-21736

Publication date:
09/01/2024
SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2024

CVE-2024-21737

Publication date:
09/01/2024
In SAP Application Interface Framework File Adapter - version 702, a high privilege user can use a function module to traverse through various layers and execute OS commands directly. By this, such user can control the behaviour of the application. This leads to considerable impact on confidentiality, integrity and availability.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
16/01/2024

CVE-2023-26999

Publication date:
09/01/2024
An issue found in NetScout nGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2023-27000

Publication date:
09/01/2024
Cross Site Scripting vulnerability found in NetScoutnGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code via the name parameter of the Profile and Exclusion List page(s).
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2023-27098

Publication date:
09/01/2024
TP-Link Tapo APK up to v2.12.703 uses hardcoded credentials for access to the login panel.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2023-36629

Publication date:
09/01/2024
The ST ST54-android-packages-apps-Nfc package before 130-20230215-23W07p0 for Android has an out-of-bounds read.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-39336

Publication date:
09/01/2024
An unspecified SQL Injection vulnerability in Ivanti Endpoint Manager released prior to 2022 SU 5 allows an attacker with access to the internal network to execute arbitrary SQL queries and retrieve output without the need for authentication. Under specific circumstances, this may also lead to RCE on the core server.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2023-49238

Publication date:
09/01/2024
In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2023-26998

Publication date:
09/01/2024
Cross Site Scripting vulnerability found in NetScoutnGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code via the creator parameter of the Alert Configuration page.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2024-21734

Publication date:
09/01/2024
SAP Marketing (Contacts App) - version 160, allows an attacker with low privileges to trick a user to open malicious page which could lead to a very convincing phishing attack with low impact on confidentiality and integrity of the application.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/01/2024