Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8211

Publication date:
27/08/2024
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been declared as critical. This vulnerability affects the function cgi_FMT_Std2R1_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_newly_dev leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2024-45037

Publication date:
27/08/2024
The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer’s AWS account. CDK contains pre-built components called "constructs" that are higher-level abstractions providing defaults and best practices. This approach enables developers to use familiar programming languages to define complex cloud infrastructure more efficiently than writing raw CloudFormation templates. We identified an issue in AWS Cloud Development Kit (CDK) which, under certain conditions, can result in granting authenticated Amazon Cognito users broader than intended access. Specifically, if a CDK application uses the "RestApi" construct with "CognitoUserPoolAuthorizer" as the authorizer and uses authorization scopes to limit access. This issue does not affect the availability of the specific API resources. Authenticated Cognito users may gain unintended access to protected API resources or methods, leading to potential data disclosure, and modification issues. Impacted versions: >=2.142.0;=2.148.1. Users are advised to upgrade their AWS CDK version to 2.148.1 or newer and re-deploy their application(s) to address this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2024-5288

Publication date:
27/08/2024
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,<br /> <br /> such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2024

CVE-2024-5814

Publication date:
27/08/2024
A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500
Severity CVSS v4.0: MEDIUM
Last modification:
06/12/2025

CVE-2024-1544

Publication date:
27/08/2024
Generating the ECDSA nonce k samples a random number r and then <br /> truncates this randomness with a modular reduction mod n where n is the <br /> order of the elliptic curve. Meaning k = r mod n. The division used <br /> during the reduction estimates a factor q_e by dividing the upper two <br /> digits (a digit having e.g. a size of 8 byte) of r by the upper digit of <br /> n and then decrements q_e in a loop until it has the correct size. <br /> Observing the number of times q_e is decremented through a control-flow <br /> revealing side-channel reveals a bias in the most significant bits of <br /> k. Depending on the curve this is either a negligible bias or a <br /> significant bias large enough to reconstruct k with lattice reduction <br /> methods. For SECP160R1, e.g., we find a bias of 15 bits.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2022-39997

Publication date:
27/08/2024
A weak password requirement issue was discovered in Teldats Router RS123, RS123w allows a remote attacker to escalate privileges
Severity CVSS v4.0: Pending analysis
Last modification:
28/08/2024

CVE-2024-8209

Publication date:
27/08/2024
A vulnerability was found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file addClient.php. The manipulation of the argument CLIENT ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
22/04/2025

CVE-2024-43414

Publication date:
27/08/2024
Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Each team can own their slice of the graph independently, empowering them to deliver autonomously and incrementally. Instances of @apollo/query-planner &gt;=2.0.0 and =2.0.0 and
Severity CVSS v4.0: Pending analysis
Last modification:
12/09/2024

CVE-2024-43783

Publication date:
27/08/2024
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Instances of the Apollo Router running versions &gt;=1.21.0 and =1.7.0 and
Severity CVSS v4.0: Pending analysis
Last modification:
12/09/2024

CVE-2024-7720

Publication date:
27/08/2024
HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product&amp;#39;s solution open-source libraries.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2024

CVE-2024-8208

Publication date:
27/08/2024
A vulnerability has been found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file editClient.php. The manipulation of the argument AGENT ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
22/04/2025

CVE-2024-36068

Publication date:
27/08/2024
An incorrect access control vulnerability in Rubrik CDM versions prior to 9.1.2-p1, 9.0.3-p6 and 8.1.3-p12, allows an attacker with network access to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024