Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-45277

Publication date:
08/10/2024
The SAP HANA Node.js client package versions from 2.0.0 before 2.21.31 is impacted by Prototype Pollution vulnerability allowing an attacker to add arbitrary properties to global object prototypes. This is due to improper user input sanitation when using the nestTables feature causing low impact on the availability of the application. This has no impact on Confidentiality and Integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-45278

Publication date:
08/10/2024
SAP Commerce Backoffice does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-45282

Publication date:
08/10/2024
Fields which are in 'read only' state in Bank Statement Draft in Manage Bank Statements application, could be modified by MERGE method. The property of an OData entity representing assumably immutable method is not protected against external modifications leading to integrity violations. Confidentiality and Availability are not impacted.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-45382

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-39806

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-39831

Publication date:
08/10/2024
in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-43696

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-43697

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-37179

Publication date:
08/10/2024
SAP BusinessObjects Business Intelligence Platform allows an authenticated user to send a specially crafted request to the Web Intelligence Reporting Server to download any file from the machine hosting the service, causing high impact on confidentiality of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-47818

Publication date:
07/10/2024
Saltcorn is an extensible, open source, no-code database application builder. A logged-in user with any role can delete arbitrary files on the filesystem by calling the `sync/clean_sync_dir` endpoint. The `dir_name` POST parameter is not validated/sanitized and is used to construct the `syncDir` that is deleted by calling `fs.rm`. This issue has been addressed in release version 1.0.0-beta16 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-47968

Publication date:
07/10/2024
Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2024-47969

Publication date:
07/10/2024
Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2024