Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-45739

Publication date:
14/10/2024
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024

CVE-2024-45731

Publication date:
14/10/2024
In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024

CVE-2024-45732

Publication date:
14/10/2024
In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a search as the "nobody" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024

CVE-2024-45733

Publication date:
14/10/2024
In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-45734

Publication date:
14/10/2024
In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-6763

Publication date:
14/10/2024
Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing.<br /> <br /> The HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI<br /> differs from the common browsers in how it handles a URI that would be <br /> considered invalid if fully validated against the RRC. Specifically HttpURI<br /> and the browser may differ on the value of the host extracted from an <br /> invalid URI and thus a combination of Jetty and a vulnerable browser may<br /> be vulnerable to a open redirect attack or to a SSRF attack if the URI <br /> is used after passing validation checks.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-8184

Publication date:
14/10/2024
There exists a security vulnerability in Jetty&amp;#39;s ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server&amp;#39;s memory.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2023-50780

Publication date:
14/10/2024
Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.<br /> <br /> <br /> Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2025

CVE-2024-41997

Publication date:
14/10/2024
An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim&amp;#39;s machine.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2024

CVE-2024-48150

Publication date:
14/10/2024
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_451208 function.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2025

CVE-2024-48153

Publication date:
14/10/2024
DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_subconfig function.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2024-6762

Publication date:
14/10/2024
Jetty PushSessionCacheFilter can be exploited by unauthenticated users <br /> to launch remote DoS attacks by exhausting the server’s memory.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025