Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-38816

Publication date:
13/09/2024
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.<br /> <br /> Specifically, an application is vulnerable when both of the following are true:<br /> <br /> * the web application uses RouterFunctions to serve static resources<br /> * resource handling is explicitly configured with a FileSystemResource location<br /> <br /> <br /> However, malicious requests are blocked and rejected when any of the following is true:<br /> <br /> * the Spring Security HTTP Firewall https://docs.spring.io/spring-security/reference/servlet/exploits/firewall.html  is in use<br /> * the application runs on Tomcat or Jetty
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-8656

Publication date:
13/09/2024
The WPFactory Helper plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2024

CVE-2024-43180

Publication date:
13/09/2024
IBM Concert 1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2024

CVE-2024-8762

Publication date:
13/09/2024
A vulnerability was found in code-projects Crud Operation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatedata.php. The manipulation of the argument sid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2024

CVE-2024-8751

Publication date:
12/09/2024
A vulnerability in the MSC800 allows an unauthenticated attacker to modify the product’s IP<br /> address over Sopas ET. <br /> This can lead to Denial of Service. <br /> Users are recommended to upgrade both<br /> MSC800 and MSC800 LFT to version V4.26 and S2.93.20 respectively which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-7960

Publication date:
12/09/2024
The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-7961

Publication date:
12/09/2024
A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result in a remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-45607

Publication date:
12/09/2024
whatsapp-api-js is a TypeScript server agnostic Whatsapp&amp;#39;s Official API framework. It&amp;#39;s possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-6077

Publication date:
12/09/2024
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-8533

Publication date:
12/09/2024
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-20430

Publication date:
12/09/2024
A vulnerability in Cisco Meraki Systems Manager (SM) Agent for Windows could allow an authenticated, local attacker to execute arbitrary code with elevated privileges.&amp;nbsp;<br /> <br /> This vulnerability is due to incorrect handling of directory search paths at runtime. A low-privileged attacker could exploit this vulnerability by placing both malicious configuration files and malicious DLL files on an affected system, which would read and execute the files when Cisco Meraki SM launches on startup. A successful exploit could allow the attacker to execute arbitrary code on the affected system with SYSTEM privileges.&amp;nbsp;
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2024-44459

Publication date:
12/09/2024
A memory allocation issue in vernemq v2.0.1 allows attackers to cause a Denial of Service (DoS) via excessive memory consumption.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024