Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-49576

Publication date:
18/12/2024
A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a checkbox CBF_Widget object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2024

CVE-2024-12372

Publication date:
18/12/2024
A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2024-12373

Publication date:
18/12/2024
A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2023-50956

Publication date:
18/12/2024
IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 <br /> <br /> could allow a privileged user to obtain highly sensitive user credentials from secret keys that are stored in clear text.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2025

CVE-2024-12371

Publication date:
18/12/2024
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2024-56128

Publication date:
18/12/2024
Incorrect Implementation of Authentication Algorithm in Apache Kafka&amp;#39;s SCRAM implementation.<br /> <br /> Issue Summary:<br /> Apache Kafka&amp;#39;s implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802 [1].<br /> Specifically, as per RFC 5802, the server must verify that the nonce sent by the client in the second message matches the nonce sent by the server in its first message.<br /> However, Kafka&amp;#39;s SCRAM implementation did not perform this validation.<br /> <br /> Impact:<br /> This vulnerability is exploitable only when an attacker has plaintext access to the SCRAM authentication exchange. However, the usage of SCRAM over plaintext is strongly<br /> discouraged as it is considered an insecure practice [2]. Apache Kafka recommends deploying SCRAM exclusively with TLS encryption to protect SCRAM exchanges from interception [3].<br /> Deployments using SCRAM with TLS are not affected by this issue.<br /> <br /> How to Detect If You Are Impacted:<br /> If your deployment uses SCRAM authentication over plaintext communication channels (without TLS encryption), you are likely impacted.<br /> To check if TLS is enabled, review your server.properties configuration file for listeners property. If you have SASL_PLAINTEXT in the listeners, then you are likely impacted.<br /> <br /> Fix Details:<br /> The issue has been addressed by introducing nonce verification in the final message of the SCRAM authentication exchange to ensure compliance with RFC 5802.<br /> <br /> Affected Versions:<br /> Apache Kafka versions 0.10.2.0 through 3.9.0, excluding the fixed versions below.<br /> <br /> Fixed Versions:<br /> 3.9.0<br /> 3.8.1<br /> 3.7.2<br /> <br /> Users are advised to upgrade to 3.7.2 or later to mitigate this issue.<br /> <br /> Recommendations for Mitigation:<br /> Users unable to upgrade to the fixed versions can mitigate the issue by:<br /> - Using TLS with SCRAM Authentication:<br /> Always deploy SCRAM over TLS to encrypt authentication exchanges and protect against interception.<br /> - Considering Alternative Authentication Mechanisms:<br /> Evaluate alternative authentication mechanisms, such as PLAIN, Kerberos or OAuth with TLS, which provide additional layers of security.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-50570

Publication date:
18/12/2024
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript&amp;#39;s garbage collector
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2025

CVE-2024-48889

Publication date:
18/12/2024
An Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS Command Injection&amp;#39;) vulnerability [CWE-78] in FortiManager version 7.6.0, version 7.4.4 and below, version 7.2.7 and below, version 7.0.12 and below, version 6.4.14 and below and FortiManager Cloud version 7.4.4 and below, version 7.2.7 to 7.2.1, version 7.0.12 to 7.0.1 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2023-34990

Publication date:
18/12/2024
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
Severity CVSS v4.0: Pending analysis
Last modification:
05/06/2025

CVE-2024-56058

Publication date:
18/12/2024
Deserialization of Untrusted Data vulnerability in denniskravetstns VRPConnector vrpconnector allows Object Injection.This issue affects VRPConnector: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2024-56059

Publication date:
18/12/2024
Improperly Controlled Modification of Object Prototype Attributes (&amp;#39;Prototype Pollution&amp;#39;) vulnerability in farinspace Partners partners allows Object Injection.This issue affects Partners: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2024-55983

Publication date:
18/12/2024
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in PowerFormBuilder PowerFormBuilder power-forms-builder allows SQL Injection.This issue affects PowerFormBuilder: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026