Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-19753

Publication date:
30/04/2024
SimpleMiningOS through v1259 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: the vendor indicated that they have no plans to fix this, and discourage deployment using public IPv4.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2019-19754

Publication date:
30/04/2024
HiveOS through 0.6-102@191212 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-09-26, the vendor indicated that they would consider fixing this.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2024

CVE-2019-19755

Publication date:
30/04/2024
ethOS through 1.3.3 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-12-01, the vendor indicated that they plan to fix this.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2020-5200

Publication date:
30/04/2024
Minerbabe through V4.16 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2024

CVE-2023-36268

Publication date:
30/04/2024
Rejected reason: DoS issues, or unexploitable crashes, are out of scope for vulnerabilities.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2024

CVE-2024-33101

Publication date:
30/04/2024
A stored cross-site scripting (XSS) vulnerability in the component /action/anti.php of ThinkSAAS v3.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the word parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2024-33102

Publication date:
30/04/2024
A stored cross-site scripting (XSS) vulnerability in the component /pubs/counter.php of ThinkSAAS v3.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the code parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2024-33103

Publication date:
30/04/2024
An arbitrary file upload vulnerability in the Media Manager component of DokuWiki 2024-02-06a allows attackers to execute arbitrary code by uploading a crafted SVG file. NOTE: as noted in the 4267 issue reference, there is a position that exploitability can only occur with a misconfiguration of the product.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2024

CVE-2024-33831

Publication date:
30/04/2024
A stored cross-site scripting (XSS) vulnerability in the Advanced Expectation - Response module of yapi v1.10.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the body field.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-23463

Publication date:
30/04/2024
Anti-tampering protection of the Zscaler Client Connector can be bypassed under certain conditions when running the Repair App functionality. This affects Zscaler Client Connector on Windows prior to 4.2.1<br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2024

CVE-2024-29320

Publication date:
30/04/2024
Wallos before 1.15.3 is vulnerable to SQL Injection via the category and payment parameters to /subscriptions/get.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2024-33270

Publication date:
30/04/2024
An issue in FME Modules fileuploads v.2.0.3 and before and fixed in v2.0.4 allows a remote attacker to obtain sensitive information via the uploadfiles.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2024