Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-1295

Publication date:
14/06/2024
The events-calendar-pro WordPress plugin before 6.4.0.1, The Events Calendar WordPress plugin before 6.4.0.1 does not prevent users with at least the contributor role from leaking details about events they shouldn't have access to. (e.g. password-protected events, drafts, etc.)
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2023-51377

Publication date:
14/06/2024
Missing Authorization vulnerability in WPEverest Everest Forms.This issue affects Everest Forms: from n/a through 2.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-3498

Publication date:
14/06/2024
Attackers can then execute malicious files by enabling certain services of the printer via the web configuration page and elevate its privileges to root. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2024

CVE-2024-4936

Publication date:
14/06/2024
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in all versions up to, and including, 3.0.8 via the abspath parameter. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. This required allow_url_include to be enabled on the target site in order to exploit.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2024

CVE-2024-1094

Publication date:
14/06/2024
The Timetics- AI-powered Appointment Booking with Visual Seat Plan and ultimate Calendar Scheduling plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the make_staff() function in all versions up to, and including, 1.0.21. This makes it possible for unauthenticated attackers to grant users staff permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2024

CVE-2024-3496

Publication date:
14/06/2024
Attackers can bypass the web login authentication process to gain access to the printer's system information and upload malicious drivers to the printer. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2024

CVE-2024-3497

Publication date:
14/06/2024
Path traversal vulnerability in the web server of the Toshiba printer enables attacker to overwrite orginal files or add new ones to the printer. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2024

CVE-2024-5469

Publication date:
14/06/2024
DoS in KAS in GitLab CE/EE affecting all versions from 16.10.0 prior to 16.10.6 and 16.11.0 prior to 16.11.3 allows an attacker to crash KAS via crafted gRPC requests.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-31160

Publication date:
14/06/2024
The parameter used in the certain page of ASUS Download Master is not properly filtered for user input. A remote attacker with administrative privilege can insert JavaScript code to the parameter for Stored Cross-site scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2024

CVE-2024-31161

Publication date:
14/06/2024
The upload functionality of ASUS Download Master does not properly filter user input. Remote attackers with administrative privilege can exploit this vulnerability to upload any file to any location. They may even upload malicious web page files to the website directory, allowing arbitrary system commands to be executed upon browsing the webpage.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2024

CVE-2024-31159

Publication date:
14/06/2024
The parameter used in the certain page of ASUS Download Master is not properly filtered for user input. A remote attacker with administrative privilege can insert JavaScript code to the parameter for Reflected Cross-site scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2024

CVE-2024-27180

Publication date:
14/06/2024
An attacker with admin access can install rogue applications. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024