Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-11705

Publication date:
26/11/2024
`NSC_DeriveKey` inadvertently assumed that the `phKey` parameter is always non-NULL. When it was passed as NULL, a segmentation fault (SEGV) occurred, leading to crashes. This behavior conflicted with the PKCS#11 v3.0 specification, which allows `phKey` to be NULL for certain mechanisms. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2024-11704

Publication date:
26/11/2024
A double-free issue could have occurred in `sec_pkcs7_decoder_start_decrypt()` when handling an error path. Under specific conditions, the same symmetric key could have been freed twice, potentially leading to memory corruption. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-11695

Publication date:
26/11/2024
A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-11696

Publication date:
26/11/2024
The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-11697

Publication date:
26/11/2024
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-11699

Publication date:
26/11/2024
Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-11691

Publication date:
26/11/2024
Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple&amp;#39;s GPU driver. <br /> *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2024-11693

Publication date:
26/11/2024
The executable file warning was not presented when downloading .library-ms files. <br /> *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2025

CVE-2024-11692

Publication date:
26/11/2024
An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-11694

Publication date:
26/11/2024
Enhanced Tracking Protection&amp;#39;s Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2016-10408

Publication date:
26/11/2024
QSEE will randomly experience a fatal error during execution due to speculative instruction fetches from device memory. Device memory is not valid executable memory.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025

CVE-2017-18306

Publication date:
26/11/2024
Information disclosure due to uninitialized variable.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2025