Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-39226

Publication date:
06/08/2024
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2024

CVE-2024-39228

Publication date:
06/08/2024
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.
Severity CVSS v4.0: Pending analysis
Last modification:
15/08/2024

CVE-2024-39751

Publication date:
06/08/2024
IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 297429
Severity CVSS v4.0: Pending analysis
Last modification:
29/08/2024

CVE-2024-23456

Publication date:
06/08/2024
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23458

Publication date:
06/08/2024
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23460

Publication date:
06/08/2024
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23464

Publication date:
06/08/2024
In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-23483

Publication date:
06/08/2024
An Improper Input Validation vulnerability in Zscaler Client Connector on MacOS allows OS Command Injection. This issue affects Zscaler Client Connector on MacOS
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2023-28806

Publication date:
06/08/2024
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-7552

Publication date:
06/08/2024
A vulnerability was found in DataGear up to 5.0.0. It has been declared as critical. Affected by this vulnerability is the function evaluateVariableExpression of the file ConversionSqlParamValueMapper.java of the component Data Schema Page. The manipulation leads to improper neutralization of special elements used in an expression language statement. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273697 was assigned to this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2024

CVE-2024-36424

Publication date:
06/08/2024
K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-40101

Publication date:
06/08/2024
A Reflected Cross-site scripting (XSS) vulnerability exists in '/search' in microweber 2.0.15 and earlier allowing unauthenticated remote attackers to inject arbitrary web script or HTML via the 'keywords' parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025