Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-22590

Publication date:
28/05/2024
The TLS engine in Kwik commit 745fd4e2 does not track the current state of the connection. This vulnerability can allow Client Hello messages to be overwritten at any time, including after a connection has been established.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2024

CVE-2024-23315

Publication date:
28/05/2024
A read-what-where vulnerability exists in the Programming Software Connection IMM 01A1 Memory Read functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can send an unauthenticated packet to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-23601

Publication date:
28/05/2024
A code injection vulnerability exists in the scan_lib.bin functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted scan_lib.bin can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-4429

Publication date:
28/05/2024
Cross-Site Request Forgery vulnerability has been discovered in OpenText™ iManager 3.2.6.0200. This<br /> could lead to sensitive information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-5274

Publication date:
28/05/2024
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2024-2451

Publication date:
28/05/2024
Improper fingerprint validation in the TeamViewer Client (Full &amp; Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2024

CVE-2024-35397

Publication date:
28/05/2024
TOTOLINK CP900L v4.1.5cu.798_B20221228 weas discovered to contain a command injection vulnerability in the NTPSyncWithHost function via the hostTime parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-35398

Publication date:
28/05/2024
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the desc parameter in the function setMacFilterRules.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-35399

Publication date:
28/05/2024
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the password parameter in the function loginAuth
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-35400

Publication date:
28/05/2024
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the desc parameter in the function SetPortForwardRules
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-3969

Publication date:
28/05/2024
XML External Entity injection vulnerability found in OpenText™ iManager 3.2.6.0200. This could lead to remote code execution by parsing untrusted XML payload<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2025

CVE-2024-24685

Publication date:
28/05/2024
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the parsing of comments within the vertex section of an `.off` file processed via the `readOFF` function.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025