Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52726

Publication date:
30/04/2024
Open Networking Foundation SD-RAN ONOS onos-ric-sdk-go 0.8.12 allows infinite repetition of the processing of an error (in the Subscribe function implementation for the subscribed indication stream).
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2023-52727

Publication date:
30/04/2024
Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 allows an index out-of-range condition in parseAlignBits.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2023-52728

Publication date:
30/04/2024
Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 allows an index out-of-range condition in putBitString.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2024-34043

Publication date:
30/04/2024
O-RAN RICAPP kpimon-go I-Release has a segmentation violation via a certain E2AP-PDU message.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2025

CVE-2024-34047

Publication date:
30/04/2024
O-RAN RIC I-Release e2mgr lacks array size checks in RicServiceUpdateHandler.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-34048

Publication date:
30/04/2024
O-RAN RIC I-Release e2mgr lacks array size checks in E2nodeConfigUpdateNotificationHandler.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-34049

Publication date:
30/04/2024
Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return plmnIdString[0:3], plmnIdString[3:]" in reader.go.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2024-34050

Publication date:
30/04/2024
Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return uint64(b[2])
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2024-34044

Publication date:
30/04/2024
The O-RAN E2T I-Release buildPrometheusList function can have a NULL pointer dereference because peerInfo can be NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-34046

Publication date:
30/04/2024
The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->sctpParams->e2tCounters[IN_SUCC][MSG_COUNTER][ProcedureCode_id_RICsubscription]->Increment().
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-34045

Publication date:
30/04/2024
The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment().
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-33522

Publication date:
29/04/2024
In vulnerable versions of Calico (v3.27.2 and below), Calico Enterprise (v3.19.0-1, v3.18.1, v3.17.3 and below), and Calico Cloud (v19.2.0 and below), an attacker who has local access to the Kubernetes node, can escalate their privileges by exploiting a vulnerability in the Calico CNI install binary. The issue arises from an incorrect SUID (Set User ID) bit configuration in the binary, combined with the ability to control the input binary, allowing an attacker to execute an arbitrary binary with elevated privileges.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026