Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-30313

Publication date:
28/05/2024
An issue discovered in Wavlink QUANTUM D2G routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2024

CVE-2023-46694

Publication date:
28/05/2024
Vtenext 21.02 allows an authenticated attacker to upload arbitrary files, potentially enabling them to execute remote commands. This flaw exists due to the application's failure to enforce proper authentication controls when accessing the Ckeditor file manager functionality.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2022-45171

Publication date:
28/05/2024
An issue was discovered in LIVEBOX Collaboration vDesk through v018. An Unrestricted Upload of a File with a Dangerous Type can occur under the vShare web site section. A remote user, authenticated to the product, can arbitrarily upload potentially dangerous files without restrictions.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-36110

Publication date:
28/05/2024
ansibleguy-webui is an open source WebUI for using Ansible. Multiple forms in versions
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-5433

Publication date:
28/05/2024
The Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches a given expression. A specially crafted expression can lead to a path traversal vulnerability. This command combined with a specially crafted expression allows anonymous, unauthenticated access (allowed by default) by an attacker to files and directories outside of the webserver root directory they should be restricted to.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-5434

Publication date:
28/05/2024
The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-24919

Publication date:
28/05/2024
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2024-33450

Publication date:
28/05/2024
SQL Injection in Finereport v.8.0 allows a remote attacker to obtain sensitive information
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-36107

Publication date:
28/05/2024
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. `If-Modified-Since` and `If-Unmodified-Since` headers when used with anonymous requests by sending a random object name requests can be used to determine if an object exists or not on the server on a specific bucket and also gain access to some amount of<br /> information such as `Last-Modified (of the latest version)`, `Etag (of the latest version)`, `x-amz-version-id (of the latest version)`, `Expires (metadata value of the latest version)`, `Cache-Control (metadata value of the latest version)`. This conditional check was being honored before validating if the anonymous access is indeed allowed on the metadata of an object. This issue has been addressed in commit `e0fe7cc3917`. Users must upgrade to RELEASE.2024-05-27T19-17-46Z for the fix. There are no known workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2024-36109

Publication date:
28/05/2024
CoCalc is web-based software that enables collaboration in research, teaching, and scientific publishing. In affected versions the markdown parser allows `` tags to be included which execute when published. This issue has been addressed in commit `419862a9c9879c`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2024

CVE-2023-30305

Publication date:
28/05/2024
An issue discovered in Linksys E5600 routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2025

CVE-2023-30311

Publication date:
28/05/2024
An issue discovered in H3C Magic R365 and H3C Magic R100 routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2024