Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6516

Publication date:
05/12/2024
Cross Site Scripting vulnerabilities where found providing a potential for malicious scripts to be injected into a client browser. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-6784

Publication date:
05/12/2024
Server-Side Request Forgery vulnerabilities were found providing a potential for access to unauthorized resources and unintended information disclosure. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
10/04/2025

CVE-2024-54126

Publication date:
05/12/2024
This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this vulnerability by uploading and executing malicious firmware which could lead to complete compromise of the targeted device.
Severity CVSS v4.0: HIGH
Last modification:
05/12/2024

CVE-2024-54127

Publication date:
05/12/2024
This vulnerability exists in the TP-Link Archer C50 due to presence of terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the UART shell on the vulnerable device. Successful exploitation of this vulnerability could allow the attacker to obtain Wi-Fi credentials of the targeted system.
Severity CVSS v4.0: MEDIUM
Last modification:
05/12/2024

CVE-2024-51546

Publication date:
05/12/2024
Credentials Disclosure vulnerabilities allow access to on board project back-up bundles. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
10/04/2025

CVE-2024-51548

Publication date:
05/12/2024
Dangerous File Upload vulnerabilities allow upload of malicious scripts. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-51549

Publication date:
05/12/2024
Absolute File Traversal vulnerabilities allows access and modification of un-intended resources. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-51550

Publication date:
05/12/2024
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-51551

Publication date:
05/12/2024
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.07.02; <br /> NEXUS Series v3.07.02; <br /> MATRIX Series v3.07.02
Severity CVSS v4.0: CRITICAL
Last modification:
27/02/2025

CVE-2024-51554

Publication date:
05/12/2024
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.02; <br /> NEXUS Series v3.08.02; <br /> MATRIX Series v3.08.02
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025

CVE-2024-51555

Publication date:
05/12/2024
Default Credentail vulnerabilities allows access to an Aspect device using publicly available default credentials since the system does not require the installer to change default credentials. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.07.02; <br /> NEXUS Series v3.07.02; <br /> MATRIX Series v3.07.02
Severity CVSS v4.0: CRITICAL
Last modification:
28/08/2025

CVE-2024-48847

Publication date:
05/12/2024
MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application dependency calculates or validates MD5 checksum hashes. <br /> Affected products:<br /> <br /> <br /> ABB ASPECT - Enterprise v3.08.01; <br /> NEXUS Series v3.08.01; <br /> MATRIX Series v3.08.01
Severity CVSS v4.0: HIGH
Last modification:
27/02/2025