Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-33250

Publication date:
14/05/2024
An issue in Open-Source Technology Committee SRS real-time video server RS/4.0.268(Leo) and SRS/4.0.195(Leo) allows a remote attacker to execute arbitrary code via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2024

CVE-2024-32998

Publication date:
14/05/2024
NULL pointer access vulnerability in the clock module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2024-32999

Publication date:
14/05/2024
Cracking vulnerability in the OS security module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2024-32996

Publication date:
14/05/2024
Privilege escalation vulnerability in the account module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2024-32997

Publication date:
14/05/2024
Race condition vulnerability in the binder driver module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2024

CVE-2024-32993

Publication date:
14/05/2024
Out-of-bounds access vulnerability in the memory module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-32995

Publication date:
14/05/2024
Denial of service (DoS) vulnerability in the AMS module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-32991

Publication date:
14/05/2024
Permission verification vulnerability in the wpa_supplicant module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-32992

Publication date:
14/05/2024
Insufficient verification vulnerability in the baseband module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-32989

Publication date:
14/05/2024
Insufficient verification vulnerability in the system sharing pop-up module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-32990

Publication date:
14/05/2024
Permission verification vulnerability in the system sharing pop-up module<br /> Impact: Successful exploitation of this vulnerability will affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-32985

Publication date:
14/05/2024
Stellar-core is a reference implementation for the peer-to-peer agent that manages the Stellar network. Prior to 20.4.0, core nodes could be randomly crashed due to a race condition with a 3rd party library. The likelihood of affecting the network is low since crashed nodes come back up online right away. Code fix mitigation is part of Stellar-core v20.4.0 release
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2024