Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8927

Publication date:
08/10/2024
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-8926

Publication date:
08/10/2024
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-47594

Publication date:
08/10/2024
SAP NetWeaver Enterprise Portal (KMC) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability in KMC servlet. An attacker could craft a script and trick the user into clicking it. When a victim who is registered on the portal clicks on such link, confidentiality and integrity of their web browser session could be compromised.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-8925

Publication date:
08/10/2024
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-45278

Publication date:
08/10/2024
SAP Commerce Backoffice does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-45277

Publication date:
08/10/2024
The SAP HANA Node.js client package versions from 2.0.0 before 2.21.31 is impacted by Prototype Pollution vulnerability allowing an attacker to add arbitrary properties to global object prototypes. This is due to improper user input sanitation when using the nestTables feature causing low impact on the availability of the application. This has no impact on Confidentiality and Integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-45282

Publication date:
08/10/2024
Fields which are in 'read only' state in Bank Statement Draft in Manage Bank Statements application, could be modified by MERGE method. The property of an OData entity representing assumably immutable method is not protected against external modifications leading to integrity violations. Confidentiality and Availability are not impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-45382

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-39806

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-39831

Publication date:
08/10/2024
in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-43696

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-43697

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024