Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-37664

Publication date:
17/06/2024
Redmi router RB03 v1.0.57 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025

CVE-2024-37794

Publication date:
17/06/2024
Improper input validation in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT2 input file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-37795

Publication date:
17/06/2024
A segmentation fault in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT-LIB input file containing the `set-logic` command with specific formatting errors.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-36973

Publication date:
17/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()<br /> <br /> When auxiliary_device_add() returns error and then calls<br /> auxiliary_device_uninit(), callback function<br /> gp_auxiliary_device_release() calls ida_free() and<br /> kfree(aux_device_wrapper) to free memory. We should&amp;#39;t<br /> call them again in the error handling path.<br /> <br /> Fix this by skipping the redundant cleanup functions.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-36527

Publication date:
17/06/2024
puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2018-25103

Publication date:
17/06/2024
There exists use-after-free vulnerabilities in lighttpd
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2024

CVE-2024-36574

Publication date:
17/06/2024
A Prototype Pollution issue in flatten-json 1.0.1 allows an attacker to execute arbitrary code via module.exports.unflattenJSON (flatten-json/index.js:42)
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-36575

Publication date:
17/06/2024
A Prototype Pollution issue in getsetprop 1.1.0 allows an attacker to execute arbitrary code via global.accessor.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-36577

Publication date:
17/06/2024
apphp js-object-resolver
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-36578

Publication date:
17/06/2024
akbr update 1.0.0 is vulnerable to Prototype Pollution via update/index.js.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-36573

Publication date:
17/06/2024
almela obx before v.0.0.4 has a Prototype Pollution issue which allows arbitrary code execution via the obx/build/index.js:656), reduce (@almela/obx/build/index.js:470), Object.set (obx/build/index.js:269) component.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-0397

Publication date:
17/06/2024
A defect was discovered in the Python “ssl” module where there is a memory<br /> race condition with the ssl.SSLContext methods “cert_store_stats()” and<br /> “get_ca_certs()”. The race condition can be triggered if the methods are<br /> called at the same time as certificates are loaded into the SSLContext,<br /> such as during the TLS handshake with a certificate directory configured.<br /> This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025