Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52622

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: avoid online resizing failures due to oversized flex bg<br /> <br /> When we online resize an ext4 filesystem with a oversized flexbg_size,<br /> <br /> mkfs.ext4 -F -G 67108864 $dev -b 4096 100M<br /> mount $dev $dir<br /> resize2fs $dev 16G<br /> <br /> the following WARN_ON is triggered:<br /> ==================================================================<br /> WARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550<br /> Modules linked in: sg(E)<br /> CPU: 0 PID: 427 Comm: resize2fs Tainted: G E 6.6.0-rc5+ #314<br /> RIP: 0010:__alloc_pages+0x411/0x550<br /> Call Trace:<br /> <br /> __kmalloc_large_node+0xa2/0x200<br /> __kmalloc+0x16e/0x290<br /> ext4_resize_fs+0x481/0xd80<br /> __ext4_ioctl+0x1616/0x1d90<br /> ext4_ioctl+0x12/0x20<br /> __x64_sys_ioctl+0xf0/0x150<br /> do_syscall_64+0x3b/0x90<br /> ==================================================================<br /> <br /> This is because flexbg_size is too large and the size of the new_group_data<br /> array to be allocated exceeds MAX_ORDER. Currently, the minimum value of<br /> MAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding<br /> maximum number of groups that can be allocated is:<br /> <br /> (PAGE_SIZE
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2023-52624

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Wake DMCUB before executing GPINT commands<br /> <br /> [Why]<br /> DMCUB can be in idle when we attempt to interface with the HW through<br /> the GPINT mailbox resulting in a system hang.<br /> <br /> [How]<br /> Add dc_wake_and_execute_gpint() to wrap the wake, execute, sleep<br /> sequence.<br /> <br /> If the GPINT executes successfully then DMCUB will be put back into<br /> sleep after the optional response is returned.<br /> <br /> It functions similar to the inbox command interface.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2023-52623

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> SUNRPC: Fix a suspicious RCU usage warning<br /> <br /> I received the following warning while running cthon against an ontap<br /> server running pNFS:<br /> <br /> [ 57.202521] =============================<br /> [ 57.202522] WARNING: suspicious RCU usage<br /> [ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted<br /> [ 57.202525] -----------------------------<br /> [ 57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!<br /> [ 57.202527]<br /> other info that might help us debug this:<br /> <br /> [ 57.202528]<br /> rcu_scheduler_active = 2, debug_locks = 1<br /> [ 57.202529] no locks held by test5/3567.<br /> [ 57.202530]<br /> stack backtrace:<br /> [ 57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e<br /> [ 57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022<br /> [ 57.202536] Call Trace:<br /> [ 57.202537] <br /> [ 57.202540] dump_stack_lvl+0x77/0xb0<br /> [ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0<br /> [ 57.202556] rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]<br /> [ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]<br /> [ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]<br /> [ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]<br /> [ 57.202671] ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]<br /> [ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]<br /> [ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]<br /> [ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]<br /> [ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]<br /> [ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]<br /> [ 57.202788] __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]<br /> [ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]<br /> [ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]<br /> [ 57.202849] nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]<br /> [ 57.202866] write_cache_pages+0x265/0x450<br /> [ 57.202870] ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]<br /> [ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]<br /> [ 57.202913] do_writepages+0xd2/0x230<br /> [ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80<br /> [ 57.202921] filemap_fdatawrite_wbc+0x67/0x80<br /> [ 57.202924] filemap_write_and_wait_range+0xd9/0x170<br /> [ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]<br /> [ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]<br /> [ 57.202969] __se_sys_close+0x46/0xd0<br /> [ 57.202972] do_syscall_64+0x68/0x100<br /> [ 57.202975] ? do_syscall_64+0x77/0x100<br /> [ 57.202976] ? do_syscall_64+0x77/0x100<br /> [ 57.202979] entry_SYSCALL_64_after_hwframe+0x6e/0x76<br /> [ 57.202982] RIP: 0033:0x7fe2b12e4a94<br /> [ 57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3<br /> [ 57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003<br /> [ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94<br /> [ 57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003<br /> [ 57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49<br /> [ 57.202993] R10: 00007f<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-52621

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers<br /> <br /> These three bpf_map_{lookup,update,delete}_elem() helpers are also<br /> available for sleepable bpf program, so add the corresponding lock<br /> assertion for sleepable bpf program, otherwise the following warning<br /> will be reported when a sleepable bpf program manipulates bpf map under<br /> interpreter mode (aka bpf_jit_enable=0):<br /> <br /> WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......<br /> CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......<br /> RIP: 0010:bpf_map_lookup_elem+0x54/0x60<br /> ......<br /> Call Trace:<br /> <br /> ? __warn+0xa5/0x240<br /> ? bpf_map_lookup_elem+0x54/0x60<br /> ? report_bug+0x1ba/0x1f0<br /> ? handle_bug+0x40/0x80<br /> ? exc_invalid_op+0x18/0x50<br /> ? asm_exc_invalid_op+0x1b/0x20<br /> ? __pfx_bpf_map_lookup_elem+0x10/0x10<br /> ? rcu_lockdep_current_cpu_online+0x65/0xb0<br /> ? rcu_is_watching+0x23/0x50<br /> ? bpf_map_lookup_elem+0x54/0x60<br /> ? __pfx_bpf_map_lookup_elem+0x10/0x10<br /> ___bpf_prog_run+0x513/0x3b70<br /> __bpf_prog_run32+0x9d/0xd0<br /> ? __bpf_prog_enter_sleepable_recur+0xad/0x120<br /> ? __bpf_prog_enter_sleepable_recur+0x3e/0x120<br /> bpf_trampoline_6442580665+0x4d/0x1000<br /> __x64_sys_getpgid+0x5/0x30<br /> ? do_syscall_64+0x36/0xb0<br /> entry_SYSCALL_64_after_hwframe+0x6e/0x76<br />
Severity CVSS v4.0: Pending analysis
Last modification:
25/11/2025

CVE-2023-44989

Publication date:
26/03/2024
Insertion of Sensitive Information into Log File vulnerability in GSheetConnector CF7 Google Sheets Connector.This issue affects CF7 Google Sheets Connector: from n/a through 5.0.5.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2024-2894

Publication date:
26/03/2024
A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. This affects the function formSetQosBand of the file /goform/SetNetControlList. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257937 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2025

CVE-2024-2893

Publication date:
26/03/2024
A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. Affected by this issue is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257936. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2025

CVE-2024-29735

Publication date:
26/03/2024
Improper Preservation of Permissions vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.8.2 through 2.8.3.<br /> <br /> Airflow&amp;#39;s local file task handler in Airflow incorrectly set permissions for all parent folders of log folder, in default configuration adding write access to Unix group of the folders. In the case Airflow is run with the root user (not recommended) it added group write permission to all folders up to the root of the filesystem.<br /> <br /> If your log files are stored in the home directory, these permission changes might impact your ability to run SSH operations after your home directory becomes group-writeable.<br /> <br /> This issue does not affect users who use or extend Airflow using Official Airflow Docker reference images ( https://hub.docker.com/r/apache/airflow/ ) - those images require to have group write permission set anyway.<br /> <br /> You are affected only if you install Airflow using local installation / virtualenv or other Docker images, but the issue has no impact if docker containers are used as intended, i.e. where Airflow components do not share containers with other applications and users.<br /> <br /> Also you should not be affected if your umask is 002 (group write enabled) - this is the default on many linux systems.<br /> <br /> Recommendation for users using Airflow outside of the containers:<br /> <br /> * if you are using root to run Airflow, change your Airflow user to use non-root<br /> * upgrade Apache Airflow to 2.8.4 or above<br /> * If you prefer not to upgrade, you can change the https://airflow.apache.org/docs/apache-airflow/stable/configurations-ref.html#file-task-handler-new-folder-permissions  to 0o755 (original value 0o775).<br /> * if you already ran Airflow tasks before and your default umask is 022 (group write disabled) you should stop Airflow components, check permissions of AIRFLOW_HOME/logs in all your components and all parent directories of this directory and remove group write access for all the parent directories
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2024-2915

Publication date:
26/03/2024
Improper access control in PAM JIT elevation in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to elevate themselves to unauthorized groups via a specially crafted request.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2025

CVE-2024-2921

Publication date:
26/03/2024
Improper access control in PAM vault permissions in Devolutions Server 2024.1.10.0 and earlier allows an authenticated user with access to the PAM to access unauthorized PAM entries via a specific set of permissions.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2024-2929

Publication date:
26/03/2024
<br /> A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
17/12/2024

CVE-2024-2452

Publication date:
26/03/2024
In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control <br /> parameters of __portable_aligned_alloc() could cause an integer <br /> wrap-around and an allocation smaller than expected. This could cause <br /> subsequent heap buffer overflows.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025