Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-7037

Publication date:
09/10/2024
In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2025

CVE-2024-7041

Publication date:
09/10/2024
An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allowing attackers to edit other users' memories without proper authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2024-38817

Publication date:
09/10/2024
VMware NSX contains a command injection vulnerability. <br /> <br /> A malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-38818

Publication date:
09/10/2024
VMware NSX contains a local privilege escalation vulnerability. <br /> <br /> An authenticated malicious actor may exploit this vulnerability to obtain permissions from a separate group role than previously assigned.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-39525

Publication date:
09/10/2024
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> This issue only affects systems with BGP traceoptions enabled and <br /> <br /> requires a BGP session to be already established.  Systems without BGP traceoptions enabled are not affected by this issue.<br /> <br /> This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.<br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> <br /> <br /> * All versions before 21.2R3-S8, <br /> * from 21.4 before 21.4R3-S8, <br /> * from 22.2 before 22.2R3-S4, <br /> * from 22.3 before 22.3R3-S4,<br /> * from 22.4 before 22.4R3-S3, <br /> * from 23.2 before 23.2R2-S1, <br /> * from 23.4 before 23.4R2; <br /> <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> <br /> <br /> * All versions before 21.2R3-S8-EVO, <br /> * from 21.4-EVO before 21.4R3-S8-EVO, <br /> * from 22.2-EVO before 22.2R3-S4-EVO, <br /> * from 22.3-EVO before 22.3R3-S4-EVO,<br /> * from 22.4-EVO before 22.4R3-S3-EVO, <br /> * from 23.2-EVO before 23.2R2-S1-EVO, <br /> * from 23.4-EVO before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2024-39516

Publication date:
09/10/2024
An Out-of-Bounds Read vulnerability in<br /> <br /> the routing protocol daemon (rpd) of <br /> <br /> Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> <br /> This issue only affects systems configured in<br /> either of two ways:<br /> <br /> <br /> <br /> * systems with BGP traceoptions enabled<br /> <br /> * systems with BGP traffic engineering<br /> configured<br /> <br /> <br /> <br /> <br /> This issue can affect iBGP and eBGP with <br /> <br /> any address family<br /> <br /> configured. The specific attribute involved is non-transitive, and will not propagate across a network.<br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> <br /> <br /> * All versions before 21.4R3-S8,<br /> * 22.2 before 22.2R3-S5, <br /> * 22.3 before 22.3R3-S4, <br /> * 22.4 before 22.4R3-S3, <br /> * 23.2 before 23.2R2-S2, <br /> * 23.4 before 23.4R2; <br /> <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> <br /> <br /> * All versions before 21.4R3-S8-EVO, <br /> * 22.2-EVO before 22.2R3-S5-EVO, <br /> * 22.3-EVO before 22.3R3-S4-EVO, <br /> * 22.4-EVO before 22.4R3-S3-EVO, <br /> * 23.2-EVO before 23.2R2-S2-EVO, <br /> * 23.4-EVO before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2024-39515

Publication date:
09/10/2024
An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> In some cases, rpd fails to restart requiring a manual restart via the &amp;#39;restart routing&amp;#39; CLI command.<br /> <br /> This issue only affects systems with BGP traceoptions enabled and <br /> <br /> requires a BGP session to be already established. Systems without BGP traceoptions enabled are not affected by this issue.<br /> <br /> This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.<br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> * All versions before 21.4R3-S8, <br /> * 22.2 before 22.2R3-S5, <br /> * 22.3 before 22.3R3-S4, <br /> * 22.4 before 22.4R3-S3, <br /> * 23.2 before 23.2R2-S2, <br /> * 23.4 before 23.4R2; <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> * All versions before 21.4R3-S8-EVO, <br /> * 22.2-EVO before 22.2R3-S5-EVO, <br /> * 22.3-EVO before 22.3R3-S4-EVO, <br /> * 22.4-EVO before 22.4R3-S3-EVO, <br /> * 23.2-EVO before 23.2R2-S2-EVO, <br /> * 23.4-EVO before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2024-30118

Publication date:
09/10/2024
HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to because of improperly handling the request data.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-38815

Publication date:
09/10/2024
VMware NSX contains a content spoofing vulnerability. <br /> <br /> An unauthenticated malicious actor may be able to craft a URL and redirect a victim to an attacker controlled domain leading to sensitive information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-47815

Publication date:
09/10/2024
IncidentReporting is a MediaWiki extension for moving incident reports from wikitext to database tables. There are a variety of Cross-site Scripting issues, though all of them require elevated permissions. Some are available to anyone who has the `editincidents` right, some are available to those who can edit interface messages (typically administrators and interface admins), and one is available to those who can edit LocalSettings.php. These issues have been addressed in commit `43896a4` and all users are advised to upgrade. Users unable to upgrade should prevent access to the Special:IncidentReports page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-47816

Publication date:
09/10/2024
ImportDump is a mediawiki extension designed to automate user import requests. A user&amp;#39;s local actor ID is stored in the database to tell who made what requests. Therefore, if a user on another wiki happens to have the same actor ID as someone on the central wiki, the user on the other wiki can act as if they&amp;#39;re the original wiki requester. This can be abused to create new comments, edit the request, and view the request if it&amp;#39;s marked private. This issue has been addressed in commit `5c91dfc` and all users are advised to update. Users unable to update may disable the special page outside of their global wiki. See `miraheze/mw-config@e566499` for details on that.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-47828

Publication date:
09/10/2024
ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024