Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-37058

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37059

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37060

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user’s system when run.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37061

Publication date:
04/06/2024
Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user’s system when run.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37062

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library, enabling a malicously crafted report to run arbitrary code on an end user's system when loaded.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2024

CVE-2024-37054

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37055

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37056

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.23.0 or newer, enabling a maliciously uploaded LightGBM scikit-learn model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37057

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.0.0rc0 or newer, enabling a maliciously uploaded Tensorflow model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2023-49852

Publication date:
04/06/2024
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vsourz Digital Responsive Slick Slider WordPress allows Code Injection.This issue affects Responsive Slick Slider WordPress: from n/a through 1.4.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2024

CVE-2024-37052

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-37053

Publication date:
04/06/2024
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025