Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-27044

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix potential NULL pointer dereferences in &amp;#39;dcn10_set_output_transfer_func()&amp;#39;<br /> <br /> The &amp;#39;stream&amp;#39; pointer is used in dcn10_set_output_transfer_func() before<br /> the check if &amp;#39;stream&amp;#39; is NULL.<br /> <br /> Fixes the below:<br /> drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn10/dcn10_hwseq.c:1892 dcn10_set_output_transfer_func() warn: variable dereferenced before check &amp;#39;stream&amp;#39; (see line 1875)
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27045

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix a potential buffer overflow in &amp;#39;dp_dsc_clock_en_read()&amp;#39;<br /> <br /> Tell snprintf() to store at most 10 bytes in the output buffer<br /> instead of 30.<br /> <br /> Fixes the below:<br /> drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27046

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfp: flower: handle acti_netdevs allocation failure<br /> <br /> The kmalloc_array() in nfp_fl_lag_do_work() will return null, if<br /> the physical memory has run out. As a result, if we dereference<br /> the acti_netdevs, the null pointer dereference bugs will happen.<br /> <br /> This patch adds a check to judge whether allocation failure occurs.<br /> If it happens, the delayed work will be rescheduled and try again.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27047

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: phy: fix phy_get_internal_delay accessing an empty array<br /> <br /> The phy_get_internal_delay function could try to access to an empty<br /> array in the case that the driver is calling phy_get_internal_delay<br /> without defining delay_values and rx-internal-delay-ps or<br /> tx-internal-delay-ps is defined to 0 in the device-tree.<br /> This will lead to "unable to handle kernel NULL pointer dereference at<br /> virtual address 0". To avoid this kernel oops, the test should be delay<br /> &gt;= 0. As there is already delay
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27048

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: brcm80211: handle pmk_op allocation failure<br /> <br /> The kzalloc() in brcmf_pmksa_v3_op() will return null if the<br /> physical memory has run out. As a result, if we dereference<br /> the null value, the null pointer dereference bug will happen.<br /> <br /> Return -ENOMEM from brcmf_pmksa_v3_op() if kzalloc() fails<br /> for pmk_op.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2022-48669

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> powerpc/pseries: Fix potential memleak in papr_get_attr()<br /> <br /> `buf` is allocated in papr_get_attr(), and krealloc() of `buf`<br /> could fail. We need to free the original `buf` in the case of failure.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2023-52649

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/vkms: Avoid reading beyond LUT array<br /> <br /> When the floor LUT index (drm_fixp2int(lut_index) is the last<br /> index of the array the ceil LUT index will point to an entry<br /> beyond the array. Make sure we guard against it and use the<br /> value of the floor LUT index.<br /> <br /> v3:<br /> - Drop bits from commit description that didn&amp;#39;t contribute<br /> anything of value
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2023-52650

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/tegra: dsi: Add missing check for of_find_device_by_node<br /> <br /> Add check for the return value of of_find_device_by_node() and return<br /> the error if it fails in order to avoid NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2023-52651

Publication date:
01/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2024

CVE-2023-52652

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> NTB: fix possible name leak in ntb_register_device()<br /> <br /> If device_register() fails in ntb_register_device(), the device name<br /> allocated by dev_set_name() should be freed. As per the comment in<br /> device_register(), callers should use put_device() to give up the<br /> reference in the error path. So fix this by calling put_device() in the<br /> error path so that the name can be freed in kobject_cleanup().<br /> <br /> As a result of this, put_device() in the error path of<br /> ntb_register_device() is removed and the actual error is returned.<br /> <br /> [mani: reworded commit message]
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2025

CVE-2023-52653

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> SUNRPC: fix a memleak in gss_import_v2_context<br /> <br /> The ctx-&gt;mech_used.data allocated by kmemdup is not freed in neither<br /> gss_import_v2_context nor it only caller gss_krb5_import_sec_context,<br /> which frees ctx on error.<br /> <br /> Thus, this patch reform the last call of gss_import_v2_context to the<br /> gss_krb5_import_ctx_v2, preventing the memleak while keepping the return<br /> formation.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2024-0334

Publication date:
01/05/2024
The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom attribute of a link in several Elementor widgets in all versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025