Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-9409

Publication date:
19/11/2024
In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2024-48694

Publication date:
19/11/2024
File Upload vulnerability in Xi'an Daxi Information technology OfficeWeb365 v.8.6.1.0 and v7.18.23.0 allows a remote attacker to execute arbitrary code via the pw/savedraw component.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2024-50430

Publication date:
19/11/2024
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder allows Stored XSS.This issue affects Beaver Builder: from n/a through 2.8.3.7.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2024-51503

Publication date:
19/11/2024
A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have legitimate access to the domain may be able to remotely inject commands to other machines in the same domain.<br /> <br /> Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability locally and must have domain user privileges to affect other machines.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2024-52714

Publication date:
19/11/2024
Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function &amp;#39;fromSetSysTime.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2024

CVE-2024-52759

Publication date:
19/11/2024
D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2024-21697

Publication date:
19/11/2024
This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.<br /> <br /> This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.<br /> <br /> Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:<br /> Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9<br /> Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20<br /> <br /> See the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).<br /> <br /> This vulnerability was reported via our Penetration Testing program.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2018-9346

Publication date:
19/11/2024
In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9339

Publication date:
19/11/2024
In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9340

Publication date:
19/11/2024
In ResStringPool::setTo of ResourceTypes.cpp, it&amp;#39;s possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9341

Publication date:
19/11/2024
In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024

CVE-2018-9344

Publication date:
19/11/2024
In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
22/11/2024