Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-7128

Publication date:
26/07/2024
A flaw was found in the OpenShift console. Several endpoints in the application use the authHandler() and authHandlerWithUser() middleware functions. When the default authentication provider ("openShiftAuth") is set, these functions do not perform any authentication checks, relying instead on the targeted service to handle authentication and authorization. This issue leads to various degrees of data exposure due to a lack of proper credential verification.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-40689

Publication date:
26/07/2024
IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. IBM X-Force ID: 297719.
Severity CVSS v4.0: Pending analysis
Last modification:
19/10/2024

CVE-2024-41692

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the root shell on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to execute arbitrary commands with root privileges on the targeted system.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2024-41686

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to improper implementation of password policies. A local attacker could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2024

CVE-2024-41687

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to transmission of password in plain text. A remote attacker could exploit this vulnerability by intercepting transmission within an HTTP session on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2024-41688

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due lack of encryption in storing of usernames and passwords within the router&amp;#39;s firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext credentials on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2024-41689

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to unencrypted storing of WPA/ WPS credentials within the router&amp;#39;s firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext WPA/ WPS credentials on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to bypass WPA/ WPS and gain access to the Wi-Fi network of the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2024-41690

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to storing of default username and password credentials in plaintext within the router&amp;#39;s firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext default credentials on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2024-41691

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to storing of FTP credentials in plaintext within the SquashFS-root filesystem associated with the router&amp;#39;s firmware. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext FTP credentials from the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the FTP server associated with the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2024

CVE-2024-7062

Publication date:
26/07/2024
Nimble Commander suffers from a privilege escalation vulnerability due to the server (info.filesmanager.Files.PrivilegedIOHelperV2) performing improper/insufficient validation of a client’s authorization before executing an operation. Consequently, it is possible to execute system-level commands as the root user, such as changing permissions and ownership, obtaining a handle (file descriptor) of an arbitrary file, and terminating processes, among other operations.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2024-41684

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to missing secure flag for the session cookies associated with the router&amp;#39;s web management interface. An attacker with remote access could exploit this by intercepting transmission within an HTTP session on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to capture cookies and compromise the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2024

CVE-2024-41685

Publication date:
26/07/2024
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to missing HTTPOnly flag for the session cookies associated with the router&amp;#39;s web management interface. An attacker with remote access could exploit this by intercepting transmission within an HTTP session on the vulnerable system.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to capture cookies and obtain sensitive information on the targeted system.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024