Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-36823

Publication date:
06/06/2024
The encrypt() function of Ninja Core v7.0.0 was discovered to use a weak cryptographic algorithm, leading to a possible leakage of sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-24194

Publication date:
06/06/2024
robdns commit d76d2e6 was discovered to contain a NULL pointer dereference via the item->tokens component at /src/conf-parse.c.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-4013

Publication date:
06/06/2024
A bug exists in the API, mesh_node_power_off(), which fails to copy the contents of the Replay Protection <br /> List (RPL) from RAM to NVM before powering down, resulting in the ability to replay unsaved messages. Note that as of June 2024, the Gecko SDK was renamed to the Simplicity SDK, and the versioning scheme <br /> was changed from Gecko SDK vX.Y.Z to Simplicity SDK YYYY.MM.Patch#.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2023-49441

Publication date:
06/06/2024
dnsmasq 2.9 is vulnerable to Integer Overflow via forward_query.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2023-51847

Publication date:
06/06/2024
An issue in obgm and Libcoap v.a3ed466 allows a remote attacker to cause a denial of service via thecoap_context_t function in the src/coap_threadsafe.c:297:3 component.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-22074

Publication date:
06/06/2024
Dynamsoft Service 1.8.1025 through 1.8.2013, 1.7.0330 through 1.7.2531, 1.6.0428 through 1.6.1112, 1.5.0625 through 1.5.3116, 1.4.0618 through 1.4.1230, and 1.0.516 through 1.3.0115 has Incorrect Access Control. This is fixed in 1.8.2014, 1.7.4212, 1.6.3212, 1.5.31212, 1.4.3212, and 1.3.3212.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-36795

Publication date:
06/06/2024
Insecure permissions in Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 allows attackers to access URLs and directories embedded within the firmware via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2024-32752

Publication date:
06/06/2024
The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated<br /> communications with ICU, which may allow an attacker to gain unauthorized access
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2024-5480

Publication date:
06/06/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2024

CVE-2024-5550

Publication date:
06/06/2024
In h2oai/h2o-3 version 3.40.0.4, an exposure of sensitive information vulnerability exists due to an arbitrary system path lookup feature. This vulnerability allows any remote user to view full paths in the entire file system where h2o-3 is hosted. Specifically, the issue resides in the Typeahead API call, which when requested with a typeahead lookup of &amp;#39;/&amp;#39;, exposes the root filesystem including directories such as /home, /usr, /bin, among others. This vulnerability could allow attackers to explore the entire filesystem, and when combined with a Local File Inclusion (LFI) vulnerability, could make exploitation of the server trivial.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2024-5552

Publication date:
06/06/2024
kubeflow/kubeflow is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to inefficient regular expression complexity in its email validation mechanism. An attacker can remotely exploit this vulnerability without authentication by providing specially crafted input that causes the application to consume an excessive amount of CPU resources. This vulnerability affects the latest version of kubeflow/kubeflow, specifically within the centraldashboard-angular backend component. The impact of exploiting this vulnerability includes resource exhaustion, and service disruption.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2024

CVE-2024-5609

Publication date:
06/06/2024
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-6966. Reason: This candidate is a reservation duplicate of CVE-2023-6966. Notes: All CVE users should reference CVE-2023-6966 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2024