Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-43696

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-43697

Publication date:
08/10/2024
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-37179

Publication date:
08/10/2024
SAP BusinessObjects Business Intelligence Platform allows an authenticated user to send a specially crafted request to the Web Intelligence Reporting Server to download any file from the machine hosting the service, causing high impact on confidentiality of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-47818

Publication date:
07/10/2024
Saltcorn is an extensible, open source, no-code database application builder. A logged-in user with any role can delete arbitrary files on the filesystem by calling the `sync/clean_sync_dir` endpoint. The `dir_name` POST parameter is not validated/sanitized and is used to construct the `syncDir` that is deleted by calling `fs.rm`. This issue has been addressed in release version 1.0.0-beta16 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-47968

Publication date:
07/10/2024
Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2024-47969

Publication date:
07/10/2024
Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2024

CVE-2024-45874

Publication date:
07/10/2024
A DLL hijacking vulnerability in VegaBird Vooki 5.2.9 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Vooki.exe.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-47781

Publication date:
07/10/2024
CreateWiki is an extension used at Miraheze for requesting & creating wikis. The name of requested wikis is not escaped on Special:RequestWikiQueue, so a user can insert arbitrary HTML that is displayed in the request wiki queue when requesting a wiki. If a wiki creator comes across the XSS payload, their user session can be abused to retrieve deleted wiki requests, which typically contains private information. Likewise, this can also be abused on those with the ability to suppress requests to view sensitive information. This issue has been patched with commit `693a220` and all users are advised to apply the patch. Users unable to upgrade should disable Javascript and/or prevent access to the vulnerable page (Special:RequestWikiQueue).
Severity CVSS v4.0: MEDIUM
Last modification:
14/11/2024

CVE-2024-47782

Publication date:
07/10/2024
WikiDiscover is an extension designed for use with a CreateWiki managed farm to display wikis. Special:WikiDiscover is a special page that lists all wikis on the wiki farm. However, the special page does not make any effort to escape the wiki name or description. Therefore, if a wiki sets its name and/or description to an XSS payload, the XSS will execute whenever the wiki is shown on Special:WikiDiscover. This issue has been patched with commit `2ce846dd93` and all users are advised to apply that patch. User unable to upgrade should block access to `Special:WikiDiscover`.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2024-47817

Publication date:
07/10/2024
Lara-zeus Dynamic Dashboard simple way to manage widgets for your website landing page, and filament dashboard and Lara-zeus artemis is a collection of themes for the lara-zeus ecosystem. If values passed to a paragraph widget are not valid and contain a specific set of characters, applications are vulnerable to XSS attack against a user who opens a page on which a paragraph widget is rendered. Users are advised to upgrade to the appropriate fix versions detailed in the advisory metadata. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-47814

Publication date:
07/10/2024
Vim is an open source, command line text editor. A use-after-free was found in Vim
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-45873

Publication date:
07/10/2024
A DLL hijacking vulnerability in VegaBird Yaazhini 2.0.2 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024