Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-43905

Publication date:
26/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr<br /> <br /> Check return value and conduct null pointer handling to avoid null pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-43895

Publication date:
26/08/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
29/12/2025

CVE-2024-43899

Publication date:
26/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix null pointer deref in dcn20_resource.c<br /> <br /> Fixes a hang thats triggered when MPV is run on a DCN401 dGPU:<br /> <br /> mpv --hwdec=vaapi --vo=gpu --hwdec-codecs=all<br /> <br /> and then enabling fullscreen playback (double click on the video)<br /> <br /> The following calltrace will be seen:<br /> <br /> [ 181.843989] BUG: kernel NULL pointer dereference, address: 0000000000000000<br /> [ 181.843997] #PF: supervisor instruction fetch in kernel mode<br /> [ 181.844003] #PF: error_code(0x0010) - not-present page<br /> [ 181.844009] PGD 0 P4D 0<br /> [ 181.844020] Oops: 0010 [#1] PREEMPT SMP NOPTI<br /> [ 181.844028] CPU: 6 PID: 1892 Comm: gnome-shell Tainted: G W OE 6.5.0-41-generic #41~22.04.2-Ubuntu<br /> [ 181.844038] Hardware name: System manufacturer System Product Name/CROSSHAIR VI HERO, BIOS 6302 10/23/2018<br /> [ 181.844044] RIP: 0010:0x0<br /> [ 181.844079] Code: Unable to access opcode bytes at 0xffffffffffffffd6.<br /> [ 181.844084] RSP: 0018:ffffb593c2b8f7b0 EFLAGS: 00010246<br /> [ 181.844093] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004<br /> [ 181.844099] RDX: ffffb593c2b8f804 RSI: ffffb593c2b8f7e0 RDI: ffff9e3c8e758400<br /> [ 181.844105] RBP: ffffb593c2b8f7b8 R08: ffffb593c2b8f9c8 R09: ffffb593c2b8f96c<br /> [ 181.844110] R10: 0000000000000000 R11: 0000000000000000 R12: ffffb593c2b8f9c8<br /> [ 181.844115] R13: 0000000000000001 R14: ffff9e3c88000000 R15: 0000000000000005<br /> [ 181.844121] FS: 00007c6e323bb5c0(0000) GS:ffff9e3f85f80000(0000) knlGS:0000000000000000<br /> [ 181.844128] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 181.844134] CR2: ffffffffffffffd6 CR3: 0000000140fbe000 CR4: 00000000003506e0<br /> [ 181.844141] Call Trace:<br /> [ 181.844146] <br /> [ 181.844153] ? show_regs+0x6d/0x80<br /> [ 181.844167] ? __die+0x24/0x80<br /> [ 181.844179] ? page_fault_oops+0x99/0x1b0<br /> [ 181.844192] ? do_user_addr_fault+0x31d/0x6b0<br /> [ 181.844204] ? exc_page_fault+0x83/0x1b0<br /> [ 181.844216] ? asm_exc_page_fault+0x27/0x30<br /> [ 181.844237] dcn20_get_dcc_compression_cap+0x23/0x30 [amdgpu]<br /> [ 181.845115] amdgpu_dm_plane_validate_dcc.constprop.0+0xe5/0x180 [amdgpu]<br /> [ 181.845985] amdgpu_dm_plane_fill_plane_buffer_attributes+0x300/0x580 [amdgpu]<br /> [ 181.846848] fill_dc_plane_info_and_addr+0x258/0x350 [amdgpu]<br /> [ 181.847734] fill_dc_plane_attributes+0x162/0x350 [amdgpu]<br /> [ 181.848748] dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu]<br /> [ 181.849791] ? dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu]<br /> [ 181.850840] amdgpu_dm_atomic_check+0xdfe/0x1760 [amdgpu]
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2026

CVE-2024-43885

Publication date:
26/08/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2024

CVE-2024-43886

Publication date:
26/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Add null check in resource_log_pipe_topology_update<br /> <br /> [WHY]<br /> When switching from "Extend" to "Second Display Only" we sometimes<br /> call resource_get_otg_master_for_stream on a stream for the eDP,<br /> which is disconnected. This leads to a null pointer dereference.<br /> <br /> [HOW]<br /> Added a null check in dc_resource.c/resource_log_pipe_topology_update.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2024-43887

Publication date:
26/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/tcp: Disable TCP-AO static key after RCU grace period<br /> <br /> The lifetime of TCP-AO static_key is the same as the last<br /> tcp_ao_info. On the socket destruction tcp_ao_info ceases to be<br /> with RCU grace period, while tcp-ao static branch is currently deferred<br /> destructed. The static key definition is<br /> : DEFINE_STATIC_KEY_DEFERRED_FALSE(tcp_ao_needed, HZ);<br /> <br /> which means that if RCU grace period is delayed by more than a second<br /> and tcp_ao_needed is in the process of disablement, other CPUs may<br /> yet see tcp_ao_info which atent dead, but soon-to-be.<br /> And that breaks the assumption of static_key_fast_inc_not_disabled().<br /> <br /> See the comment near the definition:<br /> &gt; * The caller must make sure that the static key can&amp;#39;t get disabled while<br /> &gt; * in this function. It doesn&amp;#39;t patch jump labels, only adds a user to<br /> &gt; * an already enabled static key.<br /> <br /> Originally it was introduced in commit eb8c507296f6 ("jump_label:<br /> Prevent key-&gt;enabled int overflow"), which is needed for the atomic<br /> contexts, one of which would be the creation of a full socket from a<br /> request socket. In that atomic context, it&amp;#39;s known by the presence<br /> of the key (md5/ao) that the static branch is already enabled.<br /> So, the ref counter for that static branch is just incremented<br /> instead of holding the proper mutex.<br /> static_key_fast_inc_not_disabled() is just a helper for such usage<br /> case. But it must not be used if the static branch could get disabled<br /> in parallel as it&amp;#39;s not protected by jump_label_mutex and as a result,<br /> races with jump_label_update() implementation details.<br /> <br /> Happened on netdev test-bot[1], so not a theoretical issue:<br /> <br /> [] jump_label: Fatal kernel bug, unexpected op at tcp_inbound_hash+0x1a7/0x870 [ffffffffa8c4e9b7] (eb 50 0f 1f 44 != 66 90 0f 1f 00)) size:2 type:1<br /> [] ------------[ cut here ]------------<br /> [] kernel BUG at arch/x86/kernel/jump_label.c:73!<br /> [] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI<br /> [] CPU: 3 PID: 243 Comm: kworker/3:3 Not tainted 6.10.0-virtme #1<br /> [] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014<br /> [] Workqueue: events jump_label_update_timeout<br /> [] RIP: 0010:__jump_label_patch+0x2f6/0x350<br /> ...<br /> [] Call Trace:<br /> [] <br /> [] arch_jump_label_transform_queue+0x6c/0x110<br /> [] __jump_label_update+0xef/0x350<br /> [] __static_key_slow_dec_cpuslocked.part.0+0x3c/0x60<br /> [] jump_label_update_timeout+0x2c/0x40<br /> [] process_one_work+0xe3b/0x1670<br /> [] worker_thread+0x587/0xce0<br /> [] kthread+0x28a/0x350<br /> [] ret_from_fork+0x31/0x70<br /> [] ret_from_fork_asm+0x1a/0x30<br /> [] <br /> [] Modules linked in: veth<br /> [] ---[ end trace 0000000000000000 ]---<br /> [] RIP: 0010:__jump_label_patch+0x2f6/0x350<br /> <br /> [1]: https://netdev-3.bots.linux.dev/vmksft-tcp-ao-dbg/results/696681/5-connect-deny-ipv6/stderr
Severity CVSS v4.0: Pending analysis
Last modification:
05/09/2024

CVE-2024-43888

Publication date:
26/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm: list_lru: fix UAF for memory cgroup<br /> <br /> The mem_cgroup_from_slab_obj() is supposed to be called under rcu lock or<br /> cgroup_mutex or others which could prevent returned memcg from being<br /> freed. Fix it by adding missing rcu read lock.<br /> <br /> Found by code inspection.<br /> <br /> [songmuchun@bytedance.com: only grab rcu lock when necessary, per Vlastimil]
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2025

CVE-2024-43889

Publication date:
26/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> padata: Fix possible divide-by-0 panic in padata_mt_helper()<br /> <br /> We are hit with a not easily reproducible divide-by-0 panic in padata.c at<br /> bootup time.<br /> <br /> [ 10.017908] Oops: divide error: 0000 1 PREEMPT SMP NOPTI<br /> [ 10.017908] CPU: 26 PID: 2627 Comm: kworker/u1666:1 Not tainted 6.10.0-15.el10.x86_64 #1<br /> [ 10.017908] Hardware name: Lenovo ThinkSystem SR950 [7X12CTO1WW]/[7X12CTO1WW], BIOS [PSE140J-2.30] 07/20/2021<br /> [ 10.017908] Workqueue: events_unbound padata_mt_helper<br /> [ 10.017908] RIP: 0010:padata_mt_helper+0x39/0xb0<br /> :<br /> [ 10.017963] Call Trace:<br /> [ 10.017968] <br /> [ 10.018004] ? padata_mt_helper+0x39/0xb0<br /> [ 10.018084] process_one_work+0x174/0x330<br /> [ 10.018093] worker_thread+0x266/0x3a0<br /> [ 10.018111] kthread+0xcf/0x100<br /> [ 10.018124] ret_from_fork+0x31/0x50<br /> [ 10.018138] ret_from_fork_asm+0x1a/0x30<br /> [ 10.018147] <br /> <br /> Looking at the padata_mt_helper() function, the only way a divide-by-0<br /> panic can happen is when ps-&gt;chunk_size is 0. The way that chunk_size is<br /> initialized in padata_do_multithreaded(), chunk_size can be 0 when the<br /> min_chunk in the passed-in padata_mt_job structure is 0.<br /> <br /> Fix this divide-by-0 panic by making sure that chunk_size will be at least<br /> 1 no matter what the input parameters are.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-43442

Publication date:
26/08/2024
Improper Neutralization of Input done by an attacker with admin privileges (&amp;#39;Cross-site Scripting&amp;#39;) in  OTRS (System Configuration modules) and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the System Configuration targeting other admins.<br /> This issue affects: <br /> <br /> * OTRS from 7.0.X through 7.0.50<br /> * OTRS 8.0.X<br /> * OTRS 2023.X<br /> * OTRS from 2024.X through 2024.5.X<br /> * ((OTRS)) Community Edition: 6.0.x<br /> <br /> Products based on the ((OTRS)) Community Edition also very likely to be affected
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-43443

Publication date:
26/08/2024
Improper Neutralization of Input done by an attacker with admin privileges (&amp;#39;Cross-site Scripting&amp;#39;) in Process Management modules of OTRS and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the Process Management targeting other admins.<br /> This issue affects: <br /> <br /> * OTRS from 7.0.X through 7.0.50<br /> * OTRS 8.0.X<br /> * OTRS 2023.X<br /> * OTRS from 2024.X through 2024.5.X<br /> * ((OTRS)) Community Edition: 6.0.x<br /> <br /> Products based on the ((OTRS)) Community Edition also very likely to be affected
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-43444

Publication date:
26/08/2024
Passwords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled.<br /> <br /> This issue affects: <br /> <br /> * OTRS from 7.0.X through 7.0.50<br /> * OTRS 8.0.X<br /> * OTRS 2023.X<br /> * OTRS from 2024.X through 2024.5.X<br /> * ((OTRS)) Community Edition: 6.0.x<br /> <br /> Products based on the ((OTRS)) Community Edition also very likely to be affected
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2024-8161

Publication date:
26/08/2024
SQL injection vulnerability in ATISolutions CIGES affecting versions lower than 2.15.5. This vulnerability allows a remote attacker to send a specially crafted SQL query to the /modules/ajaxServiciosCentro.php point in the idCentro parameter and retrieve all the information stored in the database.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024