Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-37699

Publication date:
20/06/2024
An issue in DataLife Engine v.17.1 and before is vulnerable to SQL Injection in dboption.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-37349

Publication date:
20/06/2024
There is a cross-site scripting vulnerability in the<br /> management UI of Absolute Secure Access prior to version 13.06. Attackers with<br /> system administrator permissions can interfere with other system<br /> administrator’s use of the management UI when the victim administrator edits<br /> the same management object. This vulnerability is distinct from CVE-2024-37348 and<br /> CVE-2024-37351. The scope is unchanged, there is no loss of confidentiality. Impact<br /> to system integrity is high, impact to system availability is none.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2024

CVE-2024-37348

Publication date:
20/06/2024
There is a cross-site<br /> scripting vulnerability in the management UI of Absolute Secure Access prior to<br /> version 13.06. Attackers with system administrator permissions can interfere<br /> with another system administrator’s use of the management UI when the second<br /> administrator later edits the same management object. This vulnerability is<br /> distinct from CVE-2024-37349 and CVE-2024-37351. The scope is unchanged,<br /> there is no loss of confidentiality. Impact to system integrity is high, impact<br /> to system availability is none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-37626

Publication date:
20/06/2024
A command injection issue in TOTOLINK A6000R V1.0.1-B20201211.2000 firmware allows a remote attacker to execute arbitrary code via the iface parameter in the vif_enable function.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-37344

Publication date:
20/06/2024
There is a cross-site scripting vulnerability in the Policy<br /> management UI of Absolute Secure Access prior to version 13.06. Attackers with<br /> system administrator permissions can interfere with another system<br /> administrator’s use of the policy management UI when the administrators are<br /> editing the same policy object. The scope is unchanged, there is no loss of<br /> confidentiality. Impact to system availability is none, impact to system<br /> integrity is high.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2024

CVE-2024-37345

Publication date:
20/06/2024
There is a cross-site scripting vulnerability in the Secure<br /> Access administrative UI of Absolute Secure Access prior to version 13.06.<br /> Attackers can pass a limited-length script to the administrative UI which is<br /> then stored where an administrator can access it. The scope is unchanged, there<br /> is no loss of confidentiality. Impact to system availability is none, impact to<br /> system integrity is high
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2024

CVE-2024-37346

Publication date:
20/06/2024
There is an insufficient input validation vulnerability in<br /> the Warehouse component of Absolute Secure Access prior to 13.06. Attackers<br /> with system administrator permissions can impair the availability of certain<br /> elements of the Secure Access administrative UI by writing invalid data to the<br /> warehouse over the network. There is no loss of warehouse integrity or<br /> confidentiality, the security scope is unchanged. Loss of availability is high.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-37347

Publication date:
20/06/2024
There is a cross-site scripting vulnerability in the pool<br /> configuration component of the management UI of Absolute Secure Access prior to<br /> 13.06. Attackers with system administrator permissions can pass a limited<br /> length script to be run by another administrator. The scope is unchanged, there<br /> is no loss of confidentiality. Impact to system integrity is high, impact to<br /> system availability is none.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2024

CVE-2022-41324

Publication date:
20/06/2024
Northern.tech Mender 3.3.x before 3.3.2 and 3.4.x before 3.4.0 has Incorrect Access Control and allows low-privileged users default read access to some sensitive device information.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2022-45929

Publication date:
20/06/2024
Northern.tech Mender 3.3.x before 3.3.2, 3.5.x before 3.5.0, and 3.6.x before 3.6.0 has Incorrect Access Control and allows users to change their roles and could allow privilege escalation from a low-privileged read-only user to a high-privileged user.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-28397

Publication date:
20/06/2024
An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-33335

Publication date:
20/06/2024
SQL Injection vulnerability in H3C technology company SeaSQL DWS V2.0 allows a remote attacker to execute arbitrary code via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024