Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6060

Publication date:
25/06/2024
An information disclosure vulnerability in Phloc Webscopes 7.0.0 allows local attackers with access to the log files to view logged HTTP requests that contain user passwords or other sensitive information.
Severity CVSS v4.0: CRITICAL
Last modification:
30/12/2025

CVE-2024-30112

Publication date:
25/06/2024
HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user which leads to executing malicious script code. This may let the attacker steal cookie-based authentication credentials and comprise user's account then launch other attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2024-30931

Publication date:
25/06/2024
Stored Cross Site Scripting vulnerability in Emby Media Server Emby Media Server 4.8.3.0 allows a remote attacker to escalate privileges via the notifications.html component.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-35527

Publication date:
25/06/2024
An arbitrary file upload vulnerability in /fileupload/upload.cfm in Daemon PTY Limited FarCry Core framework before 7.2.14 allows attackers to execute arbitrary code via uploading a crafted .cfm file.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2024

CVE-2024-5016

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM. <br /> The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-5017

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, a path traversal vulnerability exists. A specially crafted unauthenticated HTTP request to AppProfileImport can lead can lead to information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-5018

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Path Traversal vulnerability exists Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. This allows allows reading of any file from the applications web-root directory .
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-5019

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, <br /> <br /> an unauthenticated Arbitrary File Read issue exists in Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This vulnerability allows reading of any file with iisapppool\NmConsole privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-5012

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, there is a missing authentication vulnerability in WUGDataAccess.Credentials. This vulnerability allows unauthenticated attackers to disclose Windows Credentials stored in the product Credential Library.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-5013

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Denial of Service <br /> <br /> vulnerability was identified. An unauthenticated attacker can put the application into the SetAdminPassword installation step, which renders the application non-accessible.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-5014

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, a Server Side Request Forgery vulnerability exists in the GetASPReport feature. This allows any authenticated user to retrieve ASP reports from an HTML form.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024

CVE-2024-5015

Publication date:
25/06/2024
In WhatsUp Gold versions released before 2023.1.3, an authenticated SSRF vulnerability in Wug.UI.Areas.Wug.Controllers.SessionControler.Update allows a low privileged user to chain this SSRF with an Improper Access Control vulnerability. This can be used to escalate privileges to Admin.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2024