Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-21892

Publication date:
20/02/2024
On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.<br /> Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.<br /> This allows unprivileged users to inject code that inherits the process&amp;#39;s elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-21896

Publication date:
20/02/2024
The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.<br /> This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.<br /> Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-22019

Publication date:
20/02/2024
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2023-6399

Publication date:
20/02/2024
A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the “deviceid” daemon by sending a crafted hostname to an affected device if it has the “Device Insight” feature enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2023-6398

Publication date:
20/02/2024
A post-authentication command injection vulnerability in the file upload binary in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, <br /> <br /> USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1,<br /> <br /> NWA50AX firmware versions through 6.29(ABYW.3), WAC500 firmware versions through 6.65(ABVS.1), WAX300H firmware versions through 6.60(ACHF.1), and WBE660S firmware versions through 6.65(ACGG.1) could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device via FTP.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-0715

Publication date:
20/02/2024
Expression Language Injection vulnerability in Hitachi Global Link Manager on Windows allows Code Injection.This issue affects Hitachi Global Link Manager: before 8.8.7-03.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2023-6397

Publication date:
20/02/2024
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> A null pointer dereference vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1 and USG FLEX series firmware versions from 4.50 through 5.37 Patch 1 could allow a LAN-based attacker to cause denial-of-service (DoS) conditions by downloading a crafted RAR compressed file onto a LAN-side host if the firewall has the “Anti-Malware” feature enabled.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-1648

Publication date:
20/02/2024
electron-pdf version 20.0.0 allows an external attacker to remotely obtain<br /> <br /> arbitrary local files. This is possible because the application does not<br /> <br /> validate the HTML content entered by the user.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-1647

Publication date:
20/02/2024
Pyhtml2pdf version 0.0.6 allows an external attacker to remotely obtain<br /> <br /> arbitrary local files. This is possible because the application does not<br /> <br /> validate the HTML content entered by the user.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-1297

Publication date:
20/02/2024
Loomio version 2.22.0 allows executing arbitrary commands on the server.<br /> <br /> This is possible because the application is vulnerable to OS Command Injection.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2024

CVE-2024-1644

Publication date:
20/02/2024
Suite CRM version 7.14.2 allows including local php files. This is possible<br /> <br /> because the application is vulnerable to LFI.<br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2024

CVE-2024-1651

Publication date:
20/02/2024
Torrentpier version 2.4.1 allows executing arbitrary commands on the server.<br /> <br /> This is possible because the application is vulnerable to insecure deserialization.<br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025