Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-6157

Publication date:
10/10/2024
An attacker who successfully exploited these vulnerabilities could cause the robot to stop.<br /> <br /> <br /> <br /> A vulnerability exists in the PROFINET stack included in the RobotWare versions listed below. <br /> <br /> This vulnerability arises under specific condition when specially crafted message is processed by the system.<br /> <br /> Below are reported vulnerabilities in the Robot Ware versions. <br /> <br /> * IRC5- RobotWare 6
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-9783

Publication date:
10/10/2024
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been rated as critical. This issue affects the function formLogDnsquery of the file /goform/formLogDnsquery. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
16/10/2024

CVE-2024-9784

Publication date:
10/10/2024
A vulnerability classified as critical has been found in D-Link DIR-619L B1 2.06. Affected is the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
16/10/2024

CVE-2024-6530

Publication date:
10/10/2024
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-9782

Publication date:
10/10/2024
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
16/10/2024

CVE-2024-48902

Publication date:
10/10/2024
In JetBrains YouTrack before 2024.3.46677 improper access control allowed users with project update permission to delete applications via API
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-9201

Publication date:
10/10/2024
The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the ‘id_order’ parameter of the ‘/modules/seur/ajax/saveCodFee.php’ endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-45149

Publication date:
10/10/2024
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on confidentiality. Exploitation of this issue does not require user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2024

CVE-2024-8977

Publication date:
10/10/2024
An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-9596

Publication date:
10/10/2024
An issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. It was possible for an unauthenticated attacker to determine the GitLab version number for a GitLab instance.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-9623

Publication date:
10/10/2024
An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows deploy keys to push to an archived repository.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-45132

Publication date:
10/10/2024
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security measures and affect confidentiality. Exploitation of this issue does not require user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2024