Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-34044

Publication date:
30/04/2024
The O-RAN E2T I-Release buildPrometheusList function can have a NULL pointer dereference because peerInfo can be NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2024

CVE-2024-34045

Publication date:
30/04/2024
The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment().
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-34046

Publication date:
30/04/2024
The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->sctpParams->e2tCounters[IN_SUCC][MSG_COUNTER][ProcedureCode_id_RICsubscription]->Increment().
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2024

CVE-2024-34047

Publication date:
30/04/2024
O-RAN RIC I-Release e2mgr lacks array size checks in RicServiceUpdateHandler.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-34048

Publication date:
30/04/2024
O-RAN RIC I-Release e2mgr lacks array size checks in E2nodeConfigUpdateNotificationHandler.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-34049

Publication date:
30/04/2024
Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return plmnIdString[0:3], plmnIdString[3:]" in reader.go.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-34050

Publication date:
30/04/2024
Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return uint64(b[2])
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2024-33522

Publication date:
29/04/2024
In vulnerable versions of Calico (v3.27.2 and below), Calico Enterprise (v3.19.0-1, v3.18.1, v3.17.3 and below), and Calico Cloud (v19.2.0 and below), an attacker who has local access to the Kubernetes node, can escalate their privileges by exploiting a vulnerability in the Calico CNI install binary. The issue arises from an incorrect SUID (Set User ID) bit configuration in the binary, combined with the ability to control the input binary, allowing an attacker to execute an arbitrary binary with elevated privileges.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2024

CVE-2023-50432

Publication date:
29/04/2024
simple-dhcp-server through ec976d2 allows remote attackers to cause a denial of service (daemon crash) by sending a DHCP packet without any option fields, which causes free_packet in dhcp_packet.c to dereference a NULL pointer.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-50433

Publication date:
29/04/2024
marshall in dhcp_packet.c in simple-dhcp-server through ec976d2 allows remote attackers to cause a denial of service by sending a malicious DHCP packet. The crash is caused by a type confusion bug that results in a large memory allocation; when this memory allocation fails the DHCP server will crash.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2023-50434

Publication date:
29/04/2024
emdns_resolve_raw in emdns.c in emdns through fbd1eef calls strlen with an input that may not be &amp;#39;\0&amp;#39; terminated, leading to a stack-based buffer over-read. This can be triggered by a remote adversary that can send DNS requests to the emdns server. The impact could vary depending on the system libraries, compiler, and processor architecture. Code before be565c3 is unaffected.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2024-33401

Publication date:
29/04/2024
Cross Site Scripting vulnerability in DedeCMS v.5.7.113 allows a remote attacker to run arbitrary code via the mnum parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025