Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-34321

Publication date:
12/03/2024
Improper Authentication vulnerability in Apache Pulsar Proxy allows an attacker to connect to the /proxy-stats endpoint without authentication. The vulnerable endpoint exposes detailed statistics about live connections, along with the capability to modify the logging level of proxied connections without requiring proper authentication credentials.<br /> <br /> This issue affects Apache Pulsar versions from 2.6.0 to 2.10.5, from 2.11.0 to 2.11.2, from 3.0.0 to 3.0.1, and 3.1.0.<br /> <br /> The known risks include exposing sensitive information such as connected client IP and unauthorized logging level manipulation which could lead to a denial-of-service condition by significantly increasing the proxy&amp;#39;s logging overhead. When deployed via the Apache Pulsar Helm chart within Kubernetes environments, the actual client IP might not be revealed through the load balancer&amp;#39;s default behavior, which typically obscures the original source IP addresses when externalTrafficPolicy is being configured to "Cluster" by default. The /proxy-stats endpoint contains topic level statistics, however, in the default configuration, the topic level statistics aren&amp;#39;t known to be exposed.<br /> <br /> 2.10 Pulsar Proxy users should upgrade to at least 2.10.6.<br /> 2.11 Pulsar Proxy users should upgrade to at least 2.11.3.<br /> 3.0 Pulsar Proxy users should upgrade to at least 3.0.2.<br /> 3.1 Pulsar Proxy users should upgrade to at least 3.1.1.<br /> <br /> Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions. Additionally, it&amp;#39;s imperative to recognize that the Apache Pulsar Proxy is not intended for direct exposure to the internet. The architectural design of Pulsar Proxy assumes that it will operate within a secured network environment, safeguarded by appropriate perimeter defenses.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2025

CVE-2024-27135

Publication date:
12/03/2024
Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true".<br /> <br /> This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0. <br /> <br /> 2.10 Pulsar Function Worker users should upgrade to at least 2.10.6.<br /> 2.11 Pulsar Function Worker users should upgrade to at least 2.11.4.<br /> 3.0 Pulsar Function Worker users should upgrade to at least 3.0.3.<br /> 3.1 Pulsar Function Worker users should upgrade to at least 3.1.3.<br /> 3.2 Pulsar Function Worker users should upgrade to at least 3.2.1.<br /> <br /> Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2024-1410

Publication date:
12/03/2024
Cloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see RFC 9000 Section 5.1 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Endpoints declare the number of active connection IDs they are willing to support using the active_connection_id_limit transport parameter. The peer can create new IDs using a NEW_CONNECTION_ID frame but must stay within the active ID limit. This is done by retirement of old IDs, the endpoint sends NEW_CONNECTION_ID includes a value in the retire_prior_to field, which elicits a RETIRE_CONNECTION_ID frame as confirmation. An unauthenticated remote attacker can exploit the vulnerability by sending NEW_CONNECTION_ID frames and manipulating the connection (e.g. by restricting the peer&amp;#39;s congestion window size) so that RETIRE_CONNECTION_ID frames can only be sent at a slower rate than they are received, leading to storage of information related to connection IDs in an unbounded queue. Quiche versions 0.19.2 and 0.20.1 are the earliest to address this problem. There is no workaround for affected versions.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2024

CVE-2024-1765

Publication date:
12/03/2024
Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client.<br /> A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.<br /> Exploitation was possible for the duration of the connection which could be extended by the attacker. <br /> quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2024

CVE-2024-1137

Publication date:
12/03/2024
The Proxy and Client components of TIBCO Software Inc.&amp;#39;s TIBCO ActiveSpaces - Enterprise Edition contain a vulnerability that theoretically allows an Active Spaces client to passively observe data traffic to other clients. Affected releases are TIBCO Software Inc.&amp;#39;s TIBCO ActiveSpaces - Enterprise Edition: versions 4.4.0 through 4.9.0.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2024-1138

Publication date:
12/03/2024
The FTL Server component of TIBCO Software Inc.&amp;#39;s TIBCO FTL - Enterprise Edition contains a vulnerability that allows a low privileged attacker with network access to execute a privilege escalation on the affected ftlserver. Affected releases are TIBCO Software Inc.&amp;#39;s TIBCO FTL - Enterprise Edition: versions 6.10.1 and below.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2024-2182

Publication date:
12/03/2024
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2024

CVE-2024-28338

Publication date:
12/03/2024
A login bypass in TOTOLINK A8000RU V7.1cu.643_B20200521 allows attackers to login to Administrator accounts via providing a crafted session cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-28340

Publication date:
12/03/2024
An information leak in the currentsetting.htm component of Netgear CBR40 2.5.0.28, Netgear CBK40 2.5.0.28, and Netgear CBK43 2.5.0.28 allows attackers to obtain sensitive information without any authentication required.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-28339

Publication date:
12/03/2024
An information leak in the debuginfo.htm component of Netgear CBR40 2.5.0.28, Netgear CBK40 2.5.0.28, and Netgear CBK43 2.5.0.28 allows attackers to obtain sensitive information without any authentication required.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-26203

Publication date:
12/03/2024
Azure Data Studio Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025

CVE-2024-26204

Publication date:
12/03/2024
Outlook for Android Information Disclosure Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025