Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52660

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: rkisp1: Fix IRQ handling due to shared interrupts<br /> <br /> The driver requests the interrupts as IRQF_SHARED, so the interrupt<br /> handlers can be called at any time. If such a call happens while the ISP<br /> is powered down, the SoC will hang as the driver tries to access the<br /> ISP registers.<br /> <br /> This can be reproduced even without the platform sharing the IRQ line:<br /> Enable CONFIG_DEBUG_SHIRQ and unload the driver, and the board will<br /> hang.<br /> <br /> Fix this by adding a new field, &amp;#39;irqs_enabled&amp;#39;, which is used to bail<br /> out from the interrupt handler when the ISP is not operational.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2024-27432

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: ethernet: mtk_eth_soc: fix PPE hanging issue<br /> <br /> A patch to resolve an issue was found in MediaTek&amp;#39;s GPL-licensed SDK:<br /> In the mtk_ppe_stop() function, the PPE scan mode is not disabled before<br /> disabling the PPE. This can potentially lead to a hang during the process<br /> of disabling the PPE.<br /> <br /> Without this patch, the PPE may experience a hang during the reboot test.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2025

CVE-2024-27433

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe()<br /> <br /> &amp;#39;clk_data&amp;#39; is allocated with mtk_devm_alloc_clk_data(). So calling<br /> mtk_free_clk_data() explicitly in the remove function would lead to a<br /> double-free.<br /> <br /> Remove the redundant call.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2024-5055

Publication date:
17/05/2024
Uncontrolled resource consumption vulnerability in XAMPP Windows, versions 7.3.2 and earlier. This vulnerability exists when XAMPP attempts to process many incomplete HTTP requests, resulting in resource consumption and system crashes.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-5044

Publication date:
17/05/2024
A vulnerability was found in Emlog Pro 2.3.4. It has been classified as problematic. This affects an unknown part of the component Cookie Handler. The manipulation of the argument AuthCookie leads to improper authentication. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-264741 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
05/03/2025

CVE-2024-27430

Publication date:
17/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2024

CVE-2024-5043

Publication date:
17/05/2024
A vulnerability was found in Emlog Pro 2.3.4 and classified as critical. Affected by this issue is some unknown functionality of the file admin/setting.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264740. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
05/03/2025

CVE-2024-27431

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cpumap: Zero-initialise xdp_rxq_info struct before running XDP program<br /> <br /> When running an XDP program that is attached to a cpumap entry, we don&amp;#39;t<br /> initialise the xdp_rxq_info data structure being used in the xdp_buff<br /> that backs the XDP program invocation. Tobias noticed that this leads to<br /> random values being returned as the xdp_md-&gt;rx_queue_index value for XDP<br /> programs running in a cpumap.<br /> <br /> This means we&amp;#39;re basically returning the contents of the uninitialised<br /> memory, which is bad. Fix this by zero-initialising the rxq data<br /> structure before running the XDP program.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2024-27425

Publication date:
17/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2024

CVE-2024-27426

Publication date:
17/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2024

CVE-2024-27427

Publication date:
17/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2024

CVE-2024-27428

Publication date:
17/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2024