Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-12990

Publication date:
27/12/2024
A vulnerability was found in ruifang-tech Rebuild 3.8.6. It has been classified as problematic. This affects an unknown part of the file /user/admin-verify of the component Admin Verification Page. The manipulation of the argument nexturl with the input http://localhost/evil.html leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2024-12989

Publication date:
27/12/2024
A vulnerability was found in WISI Tangram GT31 up to 20241214 and classified as problematic. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to server-side request forgery. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2024-12988

Publication date:
27/12/2024
A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is the function sub_16C4C of the component HTTP Header Handler. The manipulation of the argument Host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Severity CVSS v4.0: MEDIUM
Last modification:
28/05/2025

CVE-2024-56507

Publication date:
27/12/2024
LinkAce is a self-hosted archive to collect links of your favorite websites. Prior to 1.15.6, a reflected cross-site scripting (XSS) vulnerability exists in the LinkAce. This issue occurs in the "URL" field of the "Edit Link" module, where user input is not properly sanitized or encoded before being reflected in the HTML response. This allows attackers to inject and execute arbitrary JavaScript in the context of the victim’s browser, leading to potential session hijacking, data theft, and unauthorized actions. This vulnerability is fixed in 1.15.6.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2025

CVE-2024-56508

Publication date:
27/12/2024
LinkAce is a self-hosted archive to collect links of your favorite websites. Prior to 1.15.6, a file upload vulnerability exists in the LinkAce. This issue occurs in the "Import Bookmarks" functionality, where malicious HTML files can be uploaded containing JavaScript payloads. These payloads execute when the uploaded links are accessed, leading to potential reflected or persistent XSS scenarios. This vulnerability is fixed in 1.15.6.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2025

CVE-2024-56509

Publication date:
27/12/2024
changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. Improper input validation in the application can allow attackers to perform local file read (LFR) or path traversal attacks. These vulnerabilities occur when user input is used to construct file paths without adequate sanitization or validation. For example, using file:../../../etc/passwd or file: ///etc/passwd can bypass weak validations and allow unauthorized access to sensitive files. Even though this has been addressed in previous patch, it is still insufficient. This vulnerability is fixed in 0.48.05.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-12987

Publication date:
27/12/2024
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
Severity CVSS v4.0: MEDIUM
Last modification:
30/10/2025

CVE-2024-12856

Publication date:
27/12/2024
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2024-12986

Publication date:
27/12/2024
A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
Severity CVSS v4.0: MEDIUM
Last modification:
28/05/2025

CVE-2024-56673

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv: mm: Do not call pmd dtor on vmemmap page table teardown<br /> <br /> The vmemmap&amp;#39;s, which is used for RV64 with SPARSEMEM_VMEMMAP, page<br /> tables are populated using pmd (page middle directory) hugetables.<br /> However, the pmd allocation is not using the generic mechanism used by<br /> the VMA code (e.g. pmd_alloc()), or the RISC-V specific<br /> create_pgd_mapping()/alloc_pmd_late(). Instead, the vmemmap page table<br /> code allocates a page, and calls vmemmap_set_pmd(). This results in<br /> that the pmd ctor is *not* called, nor would it make sense to do so.<br /> <br /> Now, when tearing down a vmemmap page table pmd, the cleanup code<br /> would unconditionally, and incorrectly call the pmd dtor, which<br /> results in a crash (best case).<br /> <br /> This issue was found when running the HMM selftests:<br /> <br /> | tools/testing/selftests/mm# ./test_hmm.sh smoke<br /> | ... # when unloading the test_hmm.ko module<br /> | page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10915b<br /> | flags: 0x1000000000000000(node=0|zone=1)<br /> | raw: 1000000000000000 0000000000000000 dead000000000122 0000000000000000<br /> | raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000<br /> | page dumped because: VM_BUG_ON_PAGE(ptdesc-&gt;pmd_huge_pte)<br /> | ------------[ cut here ]------------<br /> | kernel BUG at include/linux/mm.h:3080!<br /> | Kernel BUG [#1]<br /> | Modules linked in: test_hmm(-) sch_fq_codel fuse drm drm_panel_orientation_quirks backlight dm_mod<br /> | CPU: 1 UID: 0 PID: 514 Comm: modprobe Tainted: G W 6.12.0-00982-gf2a4f1682d07 #2<br /> | Tainted: [W]=WARN<br /> | Hardware name: riscv-virtio qemu/qemu, BIOS 2024.10 10/01/2024<br /> | epc : remove_pgd_mapping+0xbec/0x1070<br /> | ra : remove_pgd_mapping+0xbec/0x1070<br /> | epc : ffffffff80010a68 ra : ffffffff80010a68 sp : ff20000000a73940<br /> | gp : ffffffff827b2d88 tp : ff6000008785da40 t0 : ffffffff80fbce04<br /> | t1 : 0720072007200720 t2 : 706d756420656761 s0 : ff20000000a73a50<br /> | s1 : ff6000008915cff8 a0 : 0000000000000039 a1 : 0000000000000008<br /> | a2 : ff600003fff0de20 a3 : 0000000000000000 a4 : 0000000000000000<br /> | a5 : 0000000000000000 a6 : c0000000ffffefff a7 : ffffffff824469b8<br /> | s2 : ff1c0000022456c0 s3 : ff1ffffffdbfffff s4 : ff6000008915c000<br /> | s5 : ff6000008915c000 s6 : ff6000008915c000 s7 : ff1ffffffdc00000<br /> | s8 : 0000000000000001 s9 : ff1ffffffdc00000 s10: ffffffff819a31f0<br /> | s11: ffffffffffffffff t3 : ffffffff8000c950 t4 : ff60000080244f00<br /> | t5 : ff60000080244000 t6 : ff20000000a73708<br /> | status: 0000000200000120 badaddr: ffffffff80010a68 cause: 0000000000000003<br /> | [] remove_pgd_mapping+0xbec/0x1070<br /> | [] vmemmap_free+0x14/0x1e<br /> | [] section_deactivate+0x220/0x452<br /> | [] sparse_remove_section+0x4a/0x58<br /> | [] __remove_pages+0x7e/0xba<br /> | [] memunmap_pages+0x2bc/0x3fe<br /> | [] dmirror_device_remove_chunks+0x2ea/0x518 [test_hmm]<br /> | [] hmm_dmirror_exit+0x3e/0x1018 [test_hmm]<br /> | [] __riscv_sys_delete_module+0x15a/0x2a6<br /> | [] do_trap_ecall_u+0x1f2/0x266<br /> | [] _new_vmalloc_restore_context_a0+0xc6/0xd2<br /> | Code: bf51 7597 0184 8593 76a5 854a 4097 0029 80e7 2c00 (9002) 7597<br /> | ---[ end trace 0000000000000000 ]---<br /> | Kernel panic - not syncing: Fatal exception in interrupt<br /> <br /> Add a check to avoid calling the pmd dtor, if the calling context is<br /> vmemmap_free().
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2024-56674

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> virtio_net: correct netdev_tx_reset_queue() invocation point<br /> <br /> When virtnet_close is followed by virtnet_open, some TX completions can<br /> possibly remain unconsumed, until they are finally processed during the<br /> first NAPI poll after the netdev_tx_reset_queue(), resulting in a crash<br /> [1]. Commit b96ed2c97c79 ("virtio_net: move netdev_tx_reset_queue() call<br /> before RX napi enable") was not sufficient to eliminate all BQL crash<br /> cases for virtio-net.<br /> <br /> This issue can be reproduced with the latest net-next master by running:<br /> `while :; do ip l set DEV down; ip l set DEV up; done` under heavy network<br /> TX load from inside the machine.<br /> <br /> netdev_tx_reset_queue() can actually be dropped from virtnet_open path;<br /> the device is not stopped in any case. For BQL core part, it&amp;#39;s just like<br /> traffic nearly ceases to exist for some period. For stall detector added<br /> to BQL, even if virtnet_close could somehow lead to some TX completions<br /> delayed for long, followed by virtnet_open, we can just take it as stall<br /> as mentioned in commit 6025b9135f7a ("net: dqs: add NIC stall detector<br /> based on BQL"). Note also that users can still reset stall_max via sysfs.<br /> <br /> So, drop netdev_tx_reset_queue() from virtnet_enable_queue_pair(). This<br /> eliminates the BQL crashes. As a result, netdev_tx_reset_queue() is now<br /> explicitly required in freeze/restore path. This patch adds it to<br /> immediately after free_unused_bufs(), following the rule of thumb:<br /> netdev_tx_reset_queue() should follow any SKB freeing not followed by<br /> netdev_tx_completed_queue(). This seems the most consistent and<br /> streamlined approach, and now netdev_tx_reset_queue() runs whenever<br /> free_unused_bufs() is done.<br /> <br /> [1]:<br /> ------------[ cut here ]------------<br /> kernel BUG at lib/dynamic_queue_limits.c:99!<br /> Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI<br /> CPU: 7 UID: 0 PID: 1598 Comm: ip Tainted: G N 6.12.0net-next_main+ #2<br /> Tainted: [N]=TEST<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), \<br /> BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014<br /> RIP: 0010:dql_completed+0x26b/0x290<br /> Code: b7 c2 49 89 e9 44 89 da 89 c6 4c 89 d7 e8 ed 17 47 00 58 65 ff 0d<br /> 4d 27 90 7e 0f 85 fd fe ff ff e8 ea 53 8d ff e9 f3 fe ff ff 0b 01<br /> d2 44 89 d1 29 d1 ba 00 00 00 00 0f 48 ca e9 28 ff ff ff<br /> RSP: 0018:ffffc900002b0d08 EFLAGS: 00010297<br /> RAX: 0000000000000000 RBX: ffff888102398c80 RCX: 0000000080190009<br /> RDX: 0000000000000000 RSI: 000000000000006a RDI: 0000000000000000<br /> RBP: ffff888102398c00 R08: 0000000000000000 R09: 0000000000000000<br /> R10: 00000000000000ca R11: 0000000000015681 R12: 0000000000000001<br /> R13: ffffc900002b0d68 R14: ffff88811115e000 R15: ffff8881107aca40<br /> FS: 00007f41ded69500(0000) GS:ffff888667dc0000(0000)<br /> knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000556ccc2dc1a0 CR3: 0000000104fd8003 CR4: 0000000000772ef0<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ? die+0x32/0x80<br /> ? do_trap+0xd9/0x100<br /> ? dql_completed+0x26b/0x290<br /> ? dql_completed+0x26b/0x290<br /> ? do_error_trap+0x6d/0xb0<br /> ? dql_completed+0x26b/0x290<br /> ? exc_invalid_op+0x4c/0x60<br /> ? dql_completed+0x26b/0x290<br /> ? asm_exc_invalid_op+0x16/0x20<br /> ? dql_completed+0x26b/0x290<br /> __free_old_xmit+0xff/0x170 [virtio_net]<br /> free_old_xmit+0x54/0xc0 [virtio_net]<br /> virtnet_poll+0xf4/0xe30 [virtio_net]<br /> ? __update_load_avg_cfs_rq+0x264/0x2d0<br /> ? update_curr+0x35/0x260<br /> ? reweight_entity+0x1be/0x260<br /> __napi_poll.constprop.0+0x28/0x1c0<br /> net_rx_action+0x329/0x420<br /> ? enqueue_hrtimer+0x35/0x90<br /> ? trace_hardirqs_on+0x1d/0x80<br /> ? kvm_sched_clock_read+0xd/0x20<br /> ? sched_clock+0xc/0x30<br /> ? kvm_sched_clock_read+0xd/0x20<br /> ? sched_clock+0xc/0x30<br /> ? sched_clock_cpu+0xd/0x1a0<br /> handle_softirqs+0x138/0x3e0<br /> do_softirq.part.0+0x89/0xc0<br /> <br /> <br /> __local_bh_enable_ip+0xa7/0xb0<br /> virtnet_open+0xc8/0x310 [virtio_net]<br /> __dev_open+0xfa/0x1b0<br /> __dev_change_flags+0x1de/0x250<br /> dev_change_flags+0x22/0x60<br /> do_setlink.isra.0+0x2df/0x10b0<br /> ? rtnetlink_rcv_msg+0x34f/0x3f0<br /> ? netlink_rcv_skb+0x54/0x100<br /> ? netlink_unicas<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2024-56672

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> blk-cgroup: Fix UAF in blkcg_unpin_online()<br /> <br /> blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To<br /> walk up, it uses blkcg_parent(blkcg) but it was calling that after<br /> blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the<br /> following UAF:<br /> <br /> ==================================================================<br /> BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270<br /> Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117<br /> <br /> CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022<br /> Workqueue: cgwb_release cgwb_release_workfn<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x27/0x80<br /> print_report+0x151/0x710<br /> kasan_report+0xc0/0x100<br /> blkcg_unpin_online+0x15a/0x270<br /> cgwb_release_workfn+0x194/0x480<br /> process_scheduled_works+0x71b/0xe20<br /> worker_thread+0x82a/0xbd0<br /> kthread+0x242/0x2c0<br /> ret_from_fork+0x33/0x70<br /> ret_from_fork_asm+0x1a/0x30<br /> <br /> ...<br /> Freed by task 1944:<br /> kasan_save_track+0x2b/0x70<br /> kasan_save_free_info+0x3c/0x50<br /> __kasan_slab_free+0x33/0x50<br /> kfree+0x10c/0x330<br /> css_free_rwork_fn+0xe6/0xb30<br /> process_scheduled_works+0x71b/0xe20<br /> worker_thread+0x82a/0xbd0<br /> kthread+0x242/0x2c0<br /> ret_from_fork+0x33/0x70<br /> ret_from_fork_asm+0x1a/0x30<br /> <br /> Note that the UAF is not easy to trigger as the free path is indirected<br /> behind a couple RCU grace periods and a work item execution. I could only<br /> trigger it with artifical msleep() injected in blkcg_unpin_online().<br /> <br /> Fix it by reading the parent pointer before destroying the blkcg&amp;#39;s blkg&amp;#39;s.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025