Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-23372

Publication date:
01/07/2024
Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-23373

Publication date:
01/07/2024
Memory corruption when IOMMU unmap operation fails, the DMA and anon buffers are getting released.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-23380

Publication date:
01/07/2024
Memory corruption while handling user packets during VBO bind operation.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-34696

Publication date:
01/07/2024
GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer&amp;#39;s Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules&amp;#39; status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.<br /> <br /> The `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator’s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.<br /> <br /> Users should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2024-21466

Publication date:
01/07/2024
Information disclosure while parsing sub-IE length during new IE generation.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-21469

Publication date:
01/07/2024
Memory corruption when an invoke call and a TEE call are bound for the same trusted application.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-21482

Publication date:
01/07/2024
Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-23368

Publication date:
01/07/2024
Memory corruption when allocating and accessing an entry in an SMEM partition.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-21460

Publication date:
01/07/2024
Information disclosure when ASLR relocates the IMEM and Secure DDR portions as one chunk in virtual address space.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-21461

Publication date:
01/07/2024
Memory corruption while performing finish HMAC operation when context is freed by keymaster.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-21462

Publication date:
01/07/2024
Transient DOS while loading the TA ELF file.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024

CVE-2024-21465

Publication date:
01/07/2024
Memory corruption while processing key blob passed by the user.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2024