Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-45409

Publication date:
10/09/2024
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2024

CVE-2024-45596

Publication date:
10/09/2024
Directus is a real-time API and App dashboard for managing SQL database content. An unauthenticated user can access credentials of last authenticated user via OpenID or OAuth2 where the authentication URL did not include redirect query string. This happens because on that endpoint for both OpenId and Oauth2 Directus is using the respond middleware, which by default will try to cache GET requests that met some conditions. Although, those conditions do not include this scenario, when an unauthenticated request returns user credentials. This vulnerability is fixed in 10.13.3 and 11.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2025

CVE-2024-34831

Publication date:
10/09/2024
cross-site scripting (XSS) vulnerability in Gibbon Core v26.0.00 allows an attacker to execute arbitrary code via the imageLink parameter in the library_manage_catalog_editProcess.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2025

CVE-2024-44667

Publication date:
10/09/2024
Shenzhen Haichangxing Technology Co., Ltd HCX H822 4G LTE Router M7628NNxISPxUIv2_v1.0.1557.15.35_P0 is vulnerable to Incorrect Access Control. Unauthenticated factory mode reset and command injection leads to information exposure and root shell access.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2024

CVE-2024-44871

Publication date:
10/09/2024
An arbitrary file upload vulnerability in the component /admin/index.php of moziloCMS v3.0 allows attackers to execute arbitrary code via uploading a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2024

CVE-2024-44872

Publication date:
10/09/2024
A reflected cross-site scripting (XSS) vulnerability in moziloCMS v3.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2024

CVE-2024-44893

Publication date:
10/09/2024
An issue in the component /jeecg-boot/jmreport/dict/list of JimuReport v1.7.8 allows attacker to escalate privileges via a crafted GET request.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2024-43482

Publication date:
10/09/2024
Microsoft Outlook for iOS Information Disclosure Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2024-43487

Publication date:
10/09/2024
Windows Mark of the Web Security Feature Bypass Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2024-43491

Publication date:
10/09/2024
Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability.<br /> This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order.<br /> Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are still under support.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-43492

Publication date:
10/09/2024
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2024-43495

Publication date:
10/09/2024
Windows libarchive Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024