Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-32317

Publication date:
17/04/2024
Tenda AC10 v4.0 V16.03.10.13 and V16.03.10.20 firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-32318

Publication date:
17/04/2024
Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the vlan parameter in the formSetVlanInfo function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-32320

Publication date:
17/04/2024
Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the timeZone parameter in the formSetTimeZone function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2024-32463

Publication date:
17/04/2024
phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. The filter to detect and prevent the use of the `javascript:` URL scheme in the `href` attribute of an `` tag could be bypassed with tab `\t` or newline `\n` characters between the characters of the protocol, e.g. `java\tscript:`. This vulnerability is fixed in 1.10.1, 1.9.2, 1.8.3, 1.7.2, 1.6.3, 1.5.3, and 1.4.2. Configuring a Content Security Policy that does not allow `unsafe-inline` would effectively prevent this vulnerability from being exploited.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-26913

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue<br /> <br /> [why]<br /> odm calculation is missing for pipe split policy determination<br /> and cause Underflow/Corruption issue.<br /> <br /> [how]<br /> Add the odm calculation.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2024

CVE-2024-26915

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Reset IH OVERFLOW_CLEAR bit<br /> <br /> Allows us to detect subsequent IH ring buffer overflows as well.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2024-26916

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Revert "drm/amd: flush any delayed gfxoff on suspend entry"<br /> <br /> commit ab4750332dbe ("drm/amdgpu/sdma5.2: add begin/end_use ring<br /> callbacks") caused GFXOFF control to be used more heavily and the<br /> codepath that was removed from commit 0dee72639533 ("drm/amd: flush any<br /> delayed gfxoff on suspend entry") now can be exercised at suspend again.<br /> <br /> Users report that by using GNOME to suspend the lockscreen trigger will<br /> cause SDMA traffic and the system can deadlock.<br /> <br /> This reverts commit 0dee726395333fea833eaaf838bc80962df886c8.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2025

CVE-2024-26917

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: Revert "scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock"<br /> <br /> This reverts commit 1a1975551943f681772720f639ff42fbaa746212.<br /> <br /> This commit causes interrupts to be lost for FCoE devices, since it changed<br /> sping locks from "bh" to "irqsave".<br /> <br /> Instead, a work queue should be used, and will be addressed in a separate<br /> commit.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-26918

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: Fix active state requirement in PME polling<br /> <br /> The commit noted in fixes added a bogus requirement that runtime PM managed<br /> devices need to be in the RPM_ACTIVE state for PME polling. In fact, only<br /> devices in low power states should be polled.<br /> <br /> However there&amp;#39;s still a requirement that the device config space must be<br /> accessible, which has implications for both the current state of the polled<br /> device and the parent bridge, when present. It&amp;#39;s not sufficient to assume<br /> the bridge remains in D0 and cases have been observed where the bridge<br /> passes the D0 test, but the PM state indicates RPM_SUSPENDING and config<br /> space of the polled device becomes inaccessible during pci_pme_wakeup().<br /> <br /> Therefore, since the bridge is already effectively required to be in the<br /> RPM_ACTIVE state, formalize this in the code and elevate the PM usage count<br /> to maintain the state while polling the subordinate device.<br /> <br /> This resolves a regression reported in the bugzilla below where a<br /> Thunderbolt/USB4 hierarchy fails to scan for an attached NVMe endpoint<br /> downstream of a bridge in a D3hot power state.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2025

CVE-2024-26919

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: ulpi: Fix debugfs directory leak<br /> <br /> The ULPI per-device debugfs root is named after the ulpi device&amp;#39;s<br /> parent, but ulpi_unregister_interface tries to remove a debugfs<br /> directory named after the ulpi device itself. This results in the<br /> directory sticking around and preventing subsequent (deferred) probes<br /> from succeeding. Change the directory name to match the ulpi device.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2025

CVE-2024-26920

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tracing/trigger: Fix to return error if failed to alloc snapshot<br /> <br /> Fix register_snapshot_trigger() to return error code if it failed to<br /> allocate a snapshot instead of 0 (success). Unless that, it will register<br /> snapshot trigger without an error.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2025

CVE-2024-30979

Publication date:
17/04/2024
Cross Site Scripting vulnerability in Cyber Cafe Management System 1.0 allows a remote attacker to execute arbitrary code via the compname parameter in edit-computer-details.php.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025