Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-8264

Publication date:
09/10/2024
Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the agent log file when detailed logging is enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024

CVE-2024-48933

Publication date:
09/10/2024
A cross-site scripting (XSS) vulnerability in LemonLDAP::NG before 2.19.3 allows remote attackers to inject arbitrary web script or HTML into the login page via a username if userControl has been set to a non-default value that allows special HTML characters.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-7037

Publication date:
09/10/2024
In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2025

CVE-2024-7041

Publication date:
09/10/2024
An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allowing attackers to edit other users' memories without proper authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2024-39525

Publication date:
09/10/2024
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> This issue only affects systems with BGP traceoptions enabled and <br /> <br /> requires a BGP session to be already established.  Systems without BGP traceoptions enabled are not affected by this issue.<br /> <br /> This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.<br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> <br /> <br /> * All versions before 21.2R3-S8, <br /> * from 21.4 before 21.4R3-S8, <br /> * from 22.2 before 22.2R3-S4, <br /> * from 22.3 before 22.3R3-S4,<br /> * from 22.4 before 22.4R3-S3, <br /> * from 23.2 before 23.2R2-S1, <br /> * from 23.4 before 23.4R2; <br /> <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> <br /> <br /> * All versions before 21.2R3-S8-EVO, <br /> * from 21.4-EVO before 21.4R3-S8-EVO, <br /> * from 22.2-EVO before 22.2R3-S4-EVO, <br /> * from 22.3-EVO before 22.3R3-S4-EVO,<br /> * from 22.4-EVO before 22.4R3-S3-EVO, <br /> * from 23.2-EVO before 23.2R2-S1-EVO, <br /> * from 23.4-EVO before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2024-39516

Publication date:
09/10/2024
An Out-of-Bounds Read vulnerability in<br /> <br /> the routing protocol daemon (rpd) of <br /> <br /> Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> <br /> This issue only affects systems configured in<br /> either of two ways:<br /> <br /> <br /> <br /> * systems with BGP traceoptions enabled<br /> <br /> * systems with BGP traffic engineering<br /> configured<br /> <br /> <br /> <br /> <br /> This issue can affect iBGP and eBGP with <br /> <br /> any address family<br /> <br /> configured. The specific attribute involved is non-transitive, and will not propagate across a network.<br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> <br /> <br /> * All versions before 21.4R3-S8,<br /> * 22.2 before 22.2R3-S5, <br /> * 22.3 before 22.3R3-S4, <br /> * 22.4 before 22.4R3-S3, <br /> * 23.2 before 23.2R2-S2, <br /> * 23.4 before 23.4R2; <br /> <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> <br /> <br /> * All versions before 21.4R3-S8-EVO, <br /> * 22.2-EVO before 22.2R3-S5-EVO, <br /> * 22.3-EVO before 22.3R3-S4-EVO, <br /> * 22.4-EVO before 22.4R3-S3-EVO, <br /> * 23.2-EVO before 23.2R2-S2-EVO, <br /> * 23.4-EVO before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2024-39515

Publication date:
09/10/2024
An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> In some cases, rpd fails to restart requiring a manual restart via the &amp;#39;restart routing&amp;#39; CLI command.<br /> <br /> This issue only affects systems with BGP traceoptions enabled and <br /> <br /> requires a BGP session to be already established. Systems without BGP traceoptions enabled are not affected by this issue.<br /> <br /> This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.<br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> * All versions before 21.4R3-S8, <br /> * 22.2 before 22.2R3-S5, <br /> * 22.3 before 22.3R3-S4, <br /> * 22.4 before 22.4R3-S3, <br /> * 23.2 before 23.2R2-S2, <br /> * 23.4 before 23.4R2; <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> * All versions before 21.4R3-S8-EVO, <br /> * 22.2-EVO before 22.2R3-S5-EVO, <br /> * 22.3-EVO before 22.3R3-S4-EVO, <br /> * 22.4-EVO before 22.4R3-S3-EVO, <br /> * 23.2-EVO before 23.2R2-S2-EVO, <br /> * 23.4-EVO before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2024-38817

Publication date:
09/10/2024
VMware NSX contains a command injection vulnerability. <br /> <br /> A malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-38818

Publication date:
09/10/2024
VMware NSX contains a local privilege escalation vulnerability. <br /> <br /> An authenticated malicious actor may exploit this vulnerability to obtain permissions from a separate group role than previously assigned.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-30118

Publication date:
09/10/2024
HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to because of improperly handling the request data.
Severity CVSS v4.0: Pending analysis
Last modification:
10/10/2024

CVE-2024-38815

Publication date:
09/10/2024
VMware NSX contains a content spoofing vulnerability. <br /> <br /> An unauthenticated malicious actor may be able to craft a URL and redirect a victim to an attacker controlled domain leading to sensitive information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-47828

Publication date:
09/10/2024
ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2024