Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-26910

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: ipset: fix performance regression in swap operation<br /> <br /> The patch "netfilter: ipset: fix race condition between swap/destroy<br /> and kernel side add/del/test", commit 28628fa9 fixes a race condition.<br /> But the synchronize_rcu() added to the swap function unnecessarily slows<br /> it down: it can safely be moved to destroy and use call_rcu() instead.<br /> <br /> Eric Dumazet pointed out that simply calling the destroy functions as<br /> rcu callback does not work: sets with timeout use garbage collectors<br /> which need cancelling at destroy which can wait. Therefore the destroy<br /> functions are split into two: cancelling garbage collectors safely at<br /> executing the command received by netlink and moving the remaining<br /> part only into the rcu callback.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2024

CVE-2024-26911

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/buddy: Fix alloc_range() error handling code<br /> <br /> Few users have observed display corruption when they boot<br /> the machine to KDE Plasma or playing games. We have root<br /> caused the problem that whenever alloc_range() couldn&amp;#39;t<br /> find the required memory blocks the function was returning<br /> SUCCESS in some of the corner cases.<br /> <br /> The right approach would be if the total allocated size<br /> is less than the required size, the function should<br /> return -ENOSPC.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2024

CVE-2024-26912

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/nouveau: fix several DMA buffer leaks<br /> <br /> Nouveau manages GSP-RM DMA buffers with nvkm_gsp_mem objects. Several of<br /> these buffers are never dealloced. Some of them can be deallocated<br /> right after GSP-RM is initialized, but the rest need to stay until the<br /> driver unloads.<br /> <br /> Also futher bullet-proof these objects by poisoning the buffer and<br /> clearing the nvkm_gsp_mem object when it is deallocated. Poisoning<br /> the buffer should trigger an error (or crash) from GSP-RM if it tries<br /> to access the buffer after we&amp;#39;ve deallocated it, because we were wrong<br /> about when it is safe to deallocate.<br /> <br /> Finally, change the mem-&gt;size field to a size_t because that&amp;#39;s the same<br /> type that dma_alloc_coherent expects.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2024

CVE-2024-29035

Publication date:
17/04/2024
Umbraco is an ASP.NET CMS. Failing webhooks logs are available when solution is not in debug mode. Those logs can contain information that is critical. This vulnerability is fixed in 13.1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
12/02/2025

CVE-2024-30253

Publication date:
17/04/2024
@solana/web3.js is the Solana JavaScript SDK. Using particular inputs with `@solana/web3.js` will result in memory exhaustion (OOM). If you have a server, client, mobile, or desktop product that accepts untrusted input for use with `@solana/web3.js`, your application/service may crash, resulting in a loss of availability. This vulnerability is fixed in 1.0.1, 1.10.2, 1.11.1, 1.12.1, 1.1.2, 1.13.1, 1.14.1, 1.15.1, 1.16.2, 1.17.1, 1.18.1, 1.19.1, 1.20.3, 1.21.1, 1.22.1, 1.23.1, 1.24.3, 1.25.1, 1.26.1, 1.27.1, 1.28.1, 1.2.8, 1.29.4, 1.30.3, 1.31.1, 1.3.1, 1.32.3, 1.33.1, 1.34.1, 1.35.2, 1.36.1, 1.37.3, 1.38.1, 1.39.2, 1.40.2, 1.41.11, 1.4.1, 1.42.1, 1.43.7, 1.44.4, 1.45.1, 1.46.1, 1.47.5, 1.48.1, 1.49.1, 1.50.2, 1.51.1, 1.5.1, 1.52.1, 1.53.1, 1.54.2, 1.55.1, 1.56.3, 1.57.1, 1.58.1, 1.59.2, 1.60.1, 1.61.2, 1.6.1, 1.62.2, 1.63.2, 1.64.1, 1.65.1, 1.66.6, 1.67.3, 1.68.2, 1.69.1, 1.70.4, 1.71.1, 1.72.1, 1.7.2, 1.73.5, 1.74.1, 1.75.1, 1.76.1, 1.77.4, 1.78.8, 1.79.1, 1.80.1, 1.81.1, 1.8.1, 1.82.1, 1.83.1, 1.84.1, 1.85.1, 1.86.1, 1.87.7, 1.88.1, 1.89.2, 1.90.2, 1.9.2, and 1.91.3.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-3825

Publication date:
17/04/2024
Versions of the BlazeMeter Jenkins plugin prior to 4.22 contain a flaw which results in credential enumeration<br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-32291

Publication date:
17/04/2024
Tenda W30E v1.0 firmware v1.0.1.25(633) has a stack overflow vulnerability via the page parameter in the fromNatlimit function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-32292

Publication date:
17/04/2024
Tenda W30E v1.0 V1.0.1.25(633) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-32293

Publication date:
17/04/2024
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the page parameter in the fromDhcpListClient function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-32299

Publication date:
17/04/2024
Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability via the PPW parameter in the fromWizardHandle function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-32302

Publication date:
17/04/2024
Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability via the PPW parameter in the fromWizardHandle function.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2024-32306

Publication date:
17/04/2024
Tenda AC10U v1.0 Firmware v15.03.06.49 has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025