Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-52714

Publication date:
19/11/2024
Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2024

CVE-2024-52759

Publication date:
19/11/2024
D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2024-21697

Publication date:
19/11/2024
This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.<br /> <br /> This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.<br /> <br /> Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:<br /> Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9<br /> Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20<br /> <br /> See the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).<br /> <br /> This vulnerability was reported via our Penetration Testing program.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2018-9346

Publication date:
19/11/2024
In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9339

Publication date:
19/11/2024
In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9340

Publication date:
19/11/2024
In ResStringPool::setTo of ResourceTypes.cpp, it&amp;#39;s possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9341

Publication date:
19/11/2024
In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9344

Publication date:
19/11/2024
In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9345

Publication date:
19/11/2024
In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2024-53075

Publication date:
19/11/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv: Prevent a bad reference count on CPU nodes<br /> <br /> When populating cache leaves we previously fetched the CPU device node<br /> at the very beginning. But when ACPI is enabled we go through a<br /> specific branch which returns early and does not call &amp;#39;of_node_put&amp;#39; for<br /> the node that was acquired.<br /> <br /> Since we are not using a CPU device node for the ACPI code anyways, we<br /> can simply move the initialization of it just passed the ACPI block, and<br /> we are guaranteed to have an &amp;#39;of_node_put&amp;#39; call for the acquired node.<br /> This prevents a bad reference count of the CPU device node.<br /> <br /> Moreover, the previous function did not check for errors when acquiring<br /> the device node, so a return -ENOENT has been added for that case.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2025

CVE-2024-53076

Publication date:
19/11/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table()<br /> <br /> If per_time_scales[i] or per_time_gains[i] kcalloc fails in the for loop<br /> of iio_gts_build_avail_scale_table(), the err_free_out will fail to call<br /> kfree() each time when i is reduced to 0, so all the per_time_scales[0]<br /> and per_time_gains[0] will not be freed, which will cause memory leaks.<br /> <br /> Fix it by checking if i &gt;= 0.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2024-53077

Publication date:
19/11/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rpcrdma: Always release the rpcrdma_device&amp;#39;s xa_array<br /> <br /> Dai pointed out that the xa_init_flags() in rpcrdma_add_one() needs<br /> to have a matching xa_destroy() in rpcrdma_remove_one() to release<br /> underlying memory that the xarray might have accrued during<br /> operation.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025