Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6154

Publication date:
20/06/2024
Parallels Desktop Toolgate Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability.<br /> <br /> The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the current user on the host system. Was ZDI-CAN-20450.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2024-6147

Publication date:
20/06/2024
Poly Plantronics Hub Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Poly Plantronics Hub. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<br /> <br /> The specific flaw exists within the Spokes Update Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18271.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2024-6153

Publication date:
20/06/2024
Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows local attackers to downgrade Parallels software on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.<br /> <br /> The specific flaw exists within the Updater service. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-19481.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2024

CVE-2024-38082

Publication date:
20/06/2024
Microsoft Edge (Chromium-based) Spoofing Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-38093

Publication date:
20/06/2024
Microsoft Edge (Chromium-based) Spoofing Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-37818

Publication date:
20/06/2024
Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request. NOTE: The Strapi Development Community argues that this issue is not valid. They contend that "the strapi/admin was wrongly attributed a flaw that only pertains to the strapi.io website, and which, at the end of the day, does not pose any real SSRF risk to applications that make use of the Strapi library."
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2024-37897

Publication date:
20/06/2024
SFTPGo is a full-featured and highly configurable SFTP, HTTP/S, FTP/S and WebDAV server - S3, Google Cloud Storage, Azure Blob. SFTPGo WebAdmin and WebClient support password reset. This feature is disabled in the default configuration.<br /> In SFTPGo versions prior to v2.6.1, if the feature is enabled, even users with access restrictions (e.g. expired) can reset their password and log in. Users are advised to upgrade to version 2.6.1. Users unable to upgrade may keep the password reset feature disabled or set a blank email address for users and admins with access restrictions so they cannot receive the email with the reset code and exploit the vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
21/06/2024

CVE-2024-37350

Publication date:
20/06/2024
There is a cross-site scripting vulnerability in the policy<br /> management UI of Absolute Secure Access prior to version 13.06. Attackers can<br /> interfere with a system administrator’s use of the policy management UI when<br /> the attacker convinces the victim administrator to follow a crafted link to the<br /> vulnerable component while the attacking administrator is authenticated to the<br /> console. The scope is unchanged, there is no loss of confidentiality. Impact to<br /> system integrity is high, impact to system availability is none.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2024-37351

Publication date:
20/06/2024
There is a cross-site scripting vulnerability in the<br /> management UI of Absolute Secure Access prior to version 13.06. Attackers with<br /> system administrator permissions can interfere with other system<br /> administrator’s use of the management UI when the second administrator later<br /> edits the same management object. This vulnerability is distinct from CVE-2024-37348 and<br /> CVE-2024-37349. The scope is unchanged, there is no loss of confidentiality. Impact<br /> to system integrity is high, impact to system availability is none.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2024-37352

Publication date:
20/06/2024
There is a cross-site scripting vulnerability in the<br /> management UI of Absolute Secure Access prior to version 13.06 that allows<br /> attackers with system administrator permissions to interfere with other system<br /> administrators’ use of the management UI when the second administrator accesses<br /> the vulnerable page. The scope is unchanged, there is no loss of<br /> confidentiality. Impact to system integrity is high, impact to system<br /> availability is none.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2024-37674

Publication date:
20/06/2024
Cross Site Scripting vulnerability in Moodle CMS v3.10 allows a remote attacker to execute arbitrary code via the Field Name (name parameter) of a new activity.
Severity CVSS v4.0: Pending analysis
Last modification:
13/06/2025

CVE-2024-37699

Publication date:
20/06/2024
An issue in DataLife Engine v.17.1 and before is vulnerable to SQL Injection in dboption.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024