Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-24898

Publication date:
03/02/2025
rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. Users are advised to upgrade. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2024-57175

Publication date:
03/02/2025
A Stored Cross-Site Scripting (XSS) vulnerability was identified in the PHPGURUKUL Online Birth Certificate System v1.0 via the profile name to /user/certificate-form.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2024-57362

Publication date:
03/02/2025
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-54840. Reason: This candidate is a reservation duplicate of CVE-2024-54840. Notes: All CVE users should reference CVE-2024-54840 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-56161

Publication date:
03/02/2025
Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-57967

Publication date:
03/02/2025
PVWA (Password Vault Web Access) in CyberArk Privileged Access Manager Self-Hosted before 14.4 has potentially elevated privileges in LDAP mapping.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-54840

Publication date:
03/02/2025
PVWA (Password Vault Web Access) in CyberArk Privileged Access Manager Self-Hosted before 14.4 does not properly address environment issues that can contribute to Host header injection.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2024-53942

Publication date:
03/02/2025
An issue was discovered on NRadio N8-180 NROS-1.9.2.n3.c5 devices. The /cgi-bin/luci/nradio/basic/radio endpoint is vulnerable to command injection via the 2.4 GHz and 5 GHz name parameters, allowing a remote attacker to execute arbitrary OS commands on the device (with root-level permissions) via crafted input.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-53943

Publication date:
03/02/2025
An issue was discovered in NRadio N8-180 NROS-1.9.2.n3.c5 devices. The /cgi-bin/luci/nradio/basic/radio endpoint is vulnerable to XSS via the 2.4 GHz and 5 GHz name parameters, allowing an attacker to execute JavaScript within the context of the current user by injecting JavaScript into the SSID field. If an administrator logs into the device, the injected script runs in their browser, executing the malicious payload.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-36437

Publication date:
03/02/2025
The com.enflick.android.TextNow (aka TextNow: Call + Text Unlimited) application 24.17.0.2 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.enflick.android.TextNow.activities.DialerActivity component.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-55456

Publication date:
03/02/2025
lunasvg v3.0.1 was discovered to contain a segmentation violation via the component gray_find_cell
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2025

CVE-2024-49833

Publication date:
03/02/2025
Memory corruption can occur in the camera when an invalid CID is used.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2024-49834

Publication date:
03/02/2025
Memory corruption while power-up or power-down sequence of the camera sensor.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025