Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-22027

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: streamzap: fix race between device disconnection and urb callback<br /> <br /> Syzkaller has reported a general protection fault at function<br /> ir_raw_event_store_with_filter(). This crash is caused by a NULL pointer<br /> dereference of dev-&gt;raw pointer, even though it is checked for NULL in<br /> the same function, which means there is a race condition. It occurs due<br /> to the incorrect order of actions in the streamzap_disconnect() function:<br /> rc_unregister_device() is called before usb_kill_urb(). The dev-&gt;raw<br /> pointer is freed and set to NULL in rc_unregister_device(), and only<br /> after that usb_kill_urb() waits for in-progress requests to finish.<br /> <br /> If rc_unregister_device() is called while streamzap_callback() handler is<br /> not finished, this can lead to accessing freed resources. Thus<br /> rc_unregister_device() should be called after usb_kill_urb().<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22033

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> arm64: Don&amp;#39;t call NULL in do_compat_alignment_fixup()<br /> <br /> do_alignment_t32_to_handler() only fixes up alignment faults for<br /> specific instructions; it returns NULL otherwise (e.g. LDREX). When<br /> that&amp;#39;s the case, signal to the caller that it needs to proceed with the<br /> regular alignment fault handling (i.e. SIGBUS). Without this patch, the<br /> kernel panics:<br /> <br /> Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000<br /> Mem abort info:<br /> ESR = 0x0000000086000006<br /> EC = 0x21: IABT (current EL), IL = 32 bits<br /> SET = 0, FnV = 0<br /> EA = 0, S1PTW = 0<br /> FSC = 0x06: level 2 translation fault<br /> user pgtable: 4k pages, 48-bit VAs, pgdp=00000800164aa000<br /> [0000000000000000] pgd=0800081fdbd22003, p4d=0800081fdbd22003, pud=08000815d51c6003, pmd=0000000000000000<br /> Internal error: Oops: 0000000086000006 [#1] SMP<br /> Modules linked in: cfg80211 rfkill xt_nat xt_tcpudp xt_conntrack nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack_netlink nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xfrm_user xfrm_algo xt_addrtype nft_compat br_netfilter veth nvme_fa&gt;<br /> libcrc32c crc32c_generic raid0 multipath linear dm_mod dax raid1 md_mod xhci_pci nvme xhci_hcd nvme_core t10_pi usbcore igb crc64_rocksoft crc64 crc_t10dif crct10dif_generic crct10dif_ce crct10dif_common usb_common i2c_algo_bit i2c&gt;<br /> CPU: 2 PID: 3932954 Comm: WPEWebProcess Not tainted 6.1.0-31-arm64 #1 Debian 6.1.128-1<br /> Hardware name: GIGABYTE MP32-AR1-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021<br /> pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : 0x0<br /> lr : do_compat_alignment_fixup+0xd8/0x3dc<br /> sp : ffff80000f973dd0<br /> x29: ffff80000f973dd0 x28: ffff081b42526180 x27: 0000000000000000<br /> x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000<br /> x23: 0000000000000004 x22: 0000000000000000 x21: 0000000000000001<br /> x20: 00000000e8551f00 x19: ffff80000f973eb0 x18: 0000000000000000<br /> x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000<br /> x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000<br /> x11: 0000000000000000 x10: 0000000000000000 x9 : ffffaebc949bc488<br /> x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000<br /> x5 : 0000000000400000 x4 : 0000fffffffffffe x3 : 0000000000000000<br /> x2 : ffff80000f973eb0 x1 : 00000000e8551f00 x0 : 0000000000000001<br /> Call trace:<br /> 0x0<br /> do_alignment_fault+0x40/0x50<br /> do_mem_abort+0x4c/0xa0<br /> el0_da+0x48/0xf0<br /> el0t_32_sync_handler+0x110/0x140<br /> el0t_32_sync+0x190/0x194<br /> Code: bad PC value<br /> ---[ end trace 0000000000000000 ]---
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-58093

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI/ASPM: Fix link state exit during switch upstream function removal<br /> <br /> Before 456d8aa37d0f ("PCI/ASPM: Disable ASPM on MFD function removal to<br /> avoid use-after-free"), we would free the ASPM link only after the last<br /> function on the bus pertaining to the given link was removed.<br /> <br /> That was too late. If function 0 is removed before sibling function,<br /> link-&gt;downstream would point to free&amp;#39;d memory after.<br /> <br /> After above change, we freed the ASPM parent link state upon any function<br /> removal on the bus pertaining to a given link.<br /> <br /> That is too early. If the link is to a PCIe switch with MFD on the upstream<br /> port, then removing functions other than 0 first would free a link which<br /> still remains parent_link to the remaining downstream ports.<br /> <br /> The resulting GPFs are especially frequent during hot-unplug, because<br /> pciehp removes devices on the link bus in reverse order.<br /> <br /> On that switch, function 0 is the virtual P2P bridge to the internal bus.<br /> Free exactly when function 0 is removed -- before the parent link is<br /> obsolete, but after all subordinate links are gone.<br /> <br /> [kwilczynski: commit log]
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2024-58094

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> jfs: add check read-only before truncation in jfs_truncate_nolock()<br /> <br /> Added a check for "read-only" mode in the `jfs_truncate_nolock`<br /> function to avoid errors related to writing to a read-only<br /> filesystem.<br /> <br /> Call stack:<br /> <br /> block_write_begin() {<br /> jfs_write_failed() {<br /> jfs_truncate() {<br /> jfs_truncate_nolock() {<br /> txEnd() {<br /> ...<br /> log = JFS_SBI(tblk-&gt;sb)-&gt;log;<br /> // (log == NULL)<br /> <br /> If the `isReadOnly(ip)` condition is triggered in<br /> `jfs_truncate_nolock`, the function execution will stop, and no<br /> further data modification will occur. Instead, the `xtTruncate`<br /> function will be called with the "COMMIT_WMAP" flag, preventing<br /> modifications in "read-only" mode.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2024-58095

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> jfs: add check read-only before txBeginAnon() call<br /> <br /> Added a read-only check before calling `txBeginAnon` in `extAlloc`<br /> and `extRecord`. This prevents modification attempts on a read-only<br /> mounted filesystem, avoiding potential errors or crashes.<br /> <br /> Call trace:<br /> txBeginAnon+0xac/0x154<br /> extAlloc+0xe8/0xdec fs/jfs/jfs_extent.c:78<br /> jfs_get_block+0x340/0xb98 fs/jfs/inode.c:248<br /> __block_write_begin_int+0x580/0x166c fs/buffer.c:2128<br /> __block_write_begin fs/buffer.c:2177 [inline]<br /> block_write_begin+0x98/0x11c fs/buffer.c:2236<br /> jfs_write_begin+0x44/0x88 fs/jfs/inode.c:299
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2024-58096

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath11k: add srng-&gt;lock for ath11k_hal_srng_* in monitor mode<br /> <br /> ath11k_hal_srng_* should be used with srng-&gt;lock to protect srng data.<br /> <br /> For ath11k_dp_rx_mon_dest_process() and ath11k_dp_full_mon_process_rx(),<br /> they use ath11k_hal_srng_* for many times but never call srng-&gt;lock.<br /> <br /> So when running (full) monitor mode, warning will occur:<br /> RIP: 0010:ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k]<br /> Call Trace:<br /> ? ath11k_hal_srng_dst_peek+0x18/0x30 [ath11k]<br /> ath11k_dp_rx_process_mon_status+0xc45/0x1190 [ath11k]<br /> ? idr_alloc_u32+0x97/0xd0<br /> ath11k_dp_rx_process_mon_rings+0x32a/0x550 [ath11k]<br /> ath11k_dp_service_srng+0x289/0x5a0 [ath11k]<br /> ath11k_pcic_ext_grp_napi_poll+0x30/0xd0 [ath11k]<br /> __napi_poll+0x30/0x1f0<br /> net_rx_action+0x198/0x320<br /> __do_softirq+0xdd/0x319<br /> <br /> So add srng-&gt;lock for them to avoid such warnings.<br /> <br /> Inorder to fetch the srng-&gt;lock, should change srng&amp;#39;s definition from<br /> &amp;#39;void&amp;#39; to &amp;#39;struct hal_srng&amp;#39;. And initialize them elsewhere to prevent<br /> one line of code from being too long. This is consistent with other ring<br /> process functions, such as ath11k_dp_process_rx().<br /> <br /> Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30<br /> Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2024-58097

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath11k: fix RCU stall while reaping monitor destination ring<br /> <br /> While processing the monitor destination ring, MSDUs are reaped from the<br /> link descriptor based on the corresponding buf_id.<br /> <br /> However, sometimes the driver cannot obtain a valid buffer corresponding<br /> to the buf_id received from the hardware. This causes an infinite loop<br /> in the destination processing, resulting in a kernel crash.<br /> <br /> kernel log:<br /> ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309<br /> ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed<br /> ath11k_pci 0000:58:00.0: data msdu_pop: invalid buf_id 309<br /> ath11k_pci 0000:58:00.0: data dp_rx_monitor_link_desc_return failed<br /> <br /> Fix this by skipping the problematic buf_id and reaping the next entry,<br /> replacing the break with the next MSDU processing.<br /> <br /> Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30<br /> Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2026

CVE-2023-53034

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans<br /> <br /> There is a kernel API ntb_mw_clear_trans() would pass 0 to both addr and<br /> size. This would make xlate_pos negative.<br /> <br /> [ 23.734156] switchtec switchtec0: MW 0: part 0 addr 0x0000000000000000 size 0x0000000000000000<br /> [ 23.734158] ================================================================================<br /> [ 23.734172] UBSAN: shift-out-of-bounds in drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7<br /> [ 23.734418] shift exponent -1 is negative<br /> <br /> Ensuring xlate_pos is a positive or zero before BIT.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-3692

Publication date:
16/04/2025
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /oews/classes/Master.php?f=save_product. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
29/04/2025

CVE-2025-3693

Publication date:
16/04/2025
A vulnerability was found in Tenda W12 3.0.0.5. It has been rated as critical. Affected by this issue is the function cgiWifiRadioSet of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
16/07/2025

CVE-2024-58248

Publication date:
16/04/2025
nopCommerce through 4.90.1 does not offer locking for order placement. Thus there is a race condition with duplicate redeeming of gift cards.
Severity CVSS v4.0: Pending analysis
Last modification:
19/12/2025

CVE-2025-3689

Publication date:
16/04/2025
A vulnerability has been found in PHPGurukul Men Salon Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-customer-detailed.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
28/05/2025