Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-2511

Publication date:
08/04/2024
Issue summary: Some non-default TLS server configurations can cause unbounded<br /> memory growth when processing TLSv1.3 sessions<br /> <br /> Impact summary: An attacker may exploit certain server configurations to trigger<br /> unbounded memory growth that would lead to a Denial of Service<br /> <br /> This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is<br /> being used (but not if early_data support is also configured and the default<br /> anti-replay protection is in use). In this case, under certain conditions, the<br /> session cache can get into an incorrect state and it will fail to flush properly<br /> as it fills. The session cache will continue to grow in an unbounded manner. A<br /> malicious client could deliberately create the scenario for this failure to<br /> force a Denial of Service. It may also happen by accident in normal operation.<br /> <br /> This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS<br /> clients.<br /> <br /> The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL<br /> 1.0.2 is also not affected by this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-31817

Publication date:
08/04/2024
In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getSysStatusCfg.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2024-28066

Publication date:
08/04/2024
In Unify CP IP Phone firmware 1.10.4.3, Weak Credentials are used (a hardcoded root password).
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2024-2834

Publication date:
08/04/2024
A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Management Center and ArcSight Platform. The vulnerability could be remotely exploited.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2024

CVE-2024-31805

Publication date:
08/04/2024
TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to start the Telnet service without authorization via the telnet_enabled parameter in the setTelnetCfg function.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-31806

Publication date:
08/04/2024
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a Denial-of-Service (DoS) vulnerability in the RebootSystem function which can reboot the system without authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-31807

Publication date:
08/04/2024
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the hostTime parameter in the NTPSyncWithHost function.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-31808

Publication date:
08/04/2024
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the webWlanIdx parameter in the setWebWlanIdx function.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-31809

Publication date:
08/04/2024
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the FileName parameter in the setUpgradeFW function.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-31811

Publication date:
08/04/2024
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the langType parameter in the setLanguageCfg function.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-31812

Publication date:
08/04/2024
In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getWiFiExtenderConfig.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-31813

Publication date:
08/04/2024
TOTOLINK EX200 V4.0.3c.7646_B20201211 does not contain an authentication mechanism by default.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025