Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-35221

Publication date:
29/05/2024
Rubygems.org is the Ruby community's gem hosting service. A Gem publisher can cause a Remote DoS when publishing a Gem. This is due to how Ruby reads the Manifest of Gem files when using Gem::Specification.from_yaml. from_yaml makes use of SafeYAML.load which allows YAML aliases inside the YAML-based metadata of a gem. YAML aliases allow for Denial of Service attacks with so-called `YAML-bombs` (comparable to Billion laughs attacks). This was patched. There is is no action required by users. This issue is also tracked as GHSL-2024-001 and was discovered by the GitHub security lab.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2024

CVE-2024-36114

Publication date:
29/05/2024
Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. All decompressor implementations of Aircompressor (LZ4, LZO, Snappy, Zstandard) can crash the JVM for certain input, and in some cases also leak the content of other memory of the Java process (which could contain sensitive information). When decompressing certain data, the decompressors try to access memory outside the bounds of the given byte arrays or byte buffers. Because Aircompressor uses the JDK class `sun.misc.Unsafe` to speed up memory access, no additional bounds checks are performed and this has similar security consequences as out-of-bounds access in C or C++, namely it can lead to non-deterministic behavior or crash the JVM. Users should update to Aircompressor 0.27 or newer where these issues have been fixed. When decompressing data from untrusted users, this can be exploited for a denial-of-service attack by crashing the JVM, or to leak other sensitive information from the Java process. There are no known workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2024

CVE-2024-35492

Publication date:
29/05/2024
Cesanta Mongoose commit b316989 was discovered to contain a NULL pointer dereference via the scpy function at src/fmt.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MQTT packet.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2024

CVE-2024-35434

Publication date:
29/05/2024
Irontec Sngrep v1.8.1 was discovered to contain a heap buffer overflow via the function rtp_check_packet at /sngrep/src/rtp.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SIP packet.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2025

CVE-2024-36016

Publication date:
29/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tty: n_gsm: fix possible out-of-bounds in gsm0_receive()<br /> <br /> Assuming the following:<br /> - side A configures the n_gsm in basic option mode<br /> - side B sends the header of a basic option mode frame with data length 1<br /> - side A switches to advanced option mode<br /> - side B sends 2 data bytes which exceeds gsm-&gt;len<br /> Reason: gsm-&gt;len is not used in advanced option mode.<br /> - side A switches to basic option mode<br /> - side B keeps sending until gsm0_receive() writes past gsm-&gt;buf<br /> Reason: Neither gsm-&gt;state nor gsm-&gt;len have been reset after<br /> reconfiguration.<br /> <br /> Fix this by changing gsm-&gt;count to gsm-&gt;len comparison from equal to less<br /> than. Also add upper limit checks against the constant MAX_MRU in<br /> gsm0_receive() and gsm1_receive() to harden against memory corruption of<br /> gsm-&gt;len and gsm-&gt;mru.<br /> <br /> All other checks remain as we still need to limit the data according to the<br /> user configuration and actual payload size.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-34715

Publication date:
29/05/2024
Fides is an open-source privacy engineering platform. The Fides webserver requires a connection to a hosted PostgreSQL database for persistent storage of application data. If the password used by the webserver for this database connection includes special characters such as `@` and `$`, webserver startup fails and the part of the password following the special character is exposed in webserver error logs. This is caused by improper escaping of the SQLAlchemy password string. As a result users are subject to a partial exposure of hosted database password in webserver logs. The vulnerability has been patched in Fides version `2.37.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no known workarounds for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2025

CVE-2024-35512

Publication date:
29/05/2024
An issue in hmq v1.5.5 allows attackers to cause a Denial of Service (DoS) via crafted requests.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2024

CVE-2024-35333

Publication date:
29/05/2024
A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024

CVE-2024-36427

Publication date:
29/05/2024
The file-serving function in TARGIT Decision Suite before 24.06.19002 (TARGIT Decision Suite 2024 – June) allows authenticated attackers to read or write to server files via a crafted file request. This can allow code execution via a .xview file.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2024

CVE-2024-32760

Publication date:
29/05/2024
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 encoder instructions can cause NGINX worker processes to terminate or cause or other potential impact.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2024-34161

Publication date:
29/05/2024
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2024-35200

Publication date:
29/05/2024
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025