Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-1319

Publication date:
04/03/2024
The Events Tickets Plus WordPress plugin before 5.9.1 does not prevent users with at least the contributor role from leaking the attendees list on any post type regardless of status. (e.g. draft, private, pending review, password-protected, and trashed posts).
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-1316

Publication date:
04/03/2024
The Event Tickets and Registration WordPress plugin before 5.8.1, Events Tickets Plus WordPress plugin before 5.9.1 does not prevent users with at least the contributor role from leaking the existence of certain events they shouldn't have access to. (e.g. draft, private, pending review, pw-protected, and trashed events).
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2023-6068

Publication date:
04/03/2024
On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2024

CVE-2024-27889

Publication date:
04/03/2024
Multiple SQL Injection vulnerabilities exist in the reporting application of the Arista Edge Threat Management - Arista NG Firewall (NGFW). A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2024

CVE-2024-2048

Publication date:
04/03/2024
Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certificate that could be used to bypass authentication. Fixed in Vault 1.15.5 and 1.14.10.
Severity CVSS v4.0: Pending analysis
Last modification:
10/06/2024

CVE-2023-32331

Publication date:
04/03/2024
IBM Connect:Express for UNIX 1.5.0 is vulnerable to a buffer overflow that could allow a remote attacker to cause a denial of service through its browser UI. IBM X-Force ID: 254979.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2025

CVE-2021-47104

Publication date:
04/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()<br /> <br /> The wrong goto label was used for the error case and missed cleanup of the<br /> pkt allocation.<br /> <br /> Addresses-Coverity-ID: 1493352 ("Resource leak")
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2021-47108

Publication date:
04/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf<br /> <br /> In commit 41ca9caaae0b<br /> ("drm/mediatek: hdmi: Add check for CEA modes only") a check<br /> for CEA modes was added to function mtk_hdmi_bridge_mode_valid()<br /> in order to address possible issues on MT8167;<br /> moreover, with commit c91026a938c2<br /> ("drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock")<br /> another similar check was introduced.<br /> <br /> Unfortunately though, at the time of writing, MT8173 does not provide<br /> any mtk_hdmi_conf structure and this is crashing the kernel with NULL<br /> pointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as<br /> soon as a HDMI cable gets plugged in.<br /> <br /> To fix this regression, add a NULL pointer check for hdmi-&gt;conf in the<br /> said function, restoring HDMI functionality and avoiding NULL pointer<br /> kernel panics.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2021-47106

Publication date:
04/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()<br /> <br /> We need to use list_for_each_entry_safe() iterator<br /> because we can not access @catchall after kfree_rcu() call.<br /> <br /> syzbot reported:<br /> <br /> BUG: KASAN: use-after-free in nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]<br /> BUG: KASAN: use-after-free in nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]<br /> BUG: KASAN: use-after-free in nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493<br /> Read of size 8 at addr ffff8880716e5b80 by task syz-executor.3/8871<br /> <br /> CPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011<br /> Call Trace:<br /> <br /> __dump_stack lib/dump_stack.c:88 [inline]<br /> dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106<br /> print_address_description.constprop.0.cold+0x8d/0x2ed mm/kasan/report.c:247<br /> __kasan_report mm/kasan/report.c:433 [inline]<br /> kasan_report.cold+0x83/0xdf mm/kasan/report.c:450<br /> nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]<br /> nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]<br /> nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493<br /> __nft_release_table+0x79f/0xcd0 net/netfilter/nf_tables_api.c:9626<br /> nft_rcv_nl_event+0x4f8/0x670 net/netfilter/nf_tables_api.c:9688<br /> notifier_call_chain+0xb5/0x200 kernel/notifier.c:83<br /> blocking_notifier_call_chain kernel/notifier.c:318 [inline]<br /> blocking_notifier_call_chain+0x67/0x90 kernel/notifier.c:306<br /> netlink_release+0xcb6/0x1dd0 net/netlink/af_netlink.c:788<br /> __sock_release+0xcd/0x280 net/socket.c:649<br /> sock_close+0x18/0x20 net/socket.c:1314<br /> __fput+0x286/0x9f0 fs/file_table.c:280<br /> task_work_run+0xdd/0x1a0 kernel/task_work.c:164<br /> tracehook_notify_resume include/linux/tracehook.h:189 [inline]<br /> exit_to_user_mode_loop kernel/entry/common.c:175 [inline]<br /> exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207<br /> __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]<br /> syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300<br /> do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> RIP: 0033:0x7f75fbf28adb<br /> Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44<br /> RSP: 002b:00007ffd8da7ec10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003<br /> RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f75fbf28adb<br /> RDX: 00007f75fc08e828 RSI: ffffffffffffffff RDI: 0000000000000003<br /> RBP: 00007f75fc08a960 R08: 0000000000000000 R09: 00007f75fc08e830<br /> R10: 00007ffd8da7ed10 R11: 0000000000000293 R12: 00000000002067c3<br /> R13: 00007ffd8da7ed10 R14: 00007f75fc088f60 R15: 0000000000000032<br /> <br /> <br /> Allocated by task 8886:<br /> kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38<br /> kasan_set_track mm/kasan/common.c:46 [inline]<br /> set_alloc_info mm/kasan/common.c:434 [inline]<br /> ____kasan_kmalloc mm/kasan/common.c:513 [inline]<br /> ____kasan_kmalloc mm/kasan/common.c:472 [inline]<br /> __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:522<br /> kasan_kmalloc include/linux/kasan.h:269 [inline]<br /> kmem_cache_alloc_trace+0x1ea/0x4a0 mm/slab.c:3575<br /> kmalloc include/linux/slab.h:590 [inline]<br /> nft_setelem_catchall_insert net/netfilter/nf_tables_api.c:5544 [inline]<br /> nft_setelem_insert net/netfilter/nf_tables_api.c:5562 [inline]<br /> nft_add_set_elem+0x232e/0x2f40 net/netfilter/nf_tables_api.c:5936<br /> nf_tables_newsetelem+0x6ff/0xbb0 net/netfilter/nf_tables_api.c:6032<br /> nfnetlink_rcv_batch+0x1710/0x25f0 net/netfilter/nfnetlink.c:513<br /> nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline]<br /> nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:652<br /> netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]<br /> netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345<br /> netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921<br /> sock_sendmsg_nosec net/<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2021-47105

Publication date:
04/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: xsk: return xsk buffers back to pool when cleaning the ring<br /> <br /> Currently we only NULL the xdp_buff pointer in the internal SW ring but<br /> we never give it back to the xsk buffer pool. This means that buffers<br /> can be leaked out of the buff pool and never be used again.<br /> <br /> Add missing xsk_buff_free() call to the routine that is supposed to<br /> clean the entries that are left in the ring so that these buffers in the<br /> umem can be used by other sockets.<br /> <br /> Also, only go through the space that is actually left to be cleaned<br /> instead of a whole ring.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2021-47107

Publication date:
04/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> NFSD: Fix READDIR buffer overflow<br /> <br /> If a client sends a READDIR count argument that is too small (say,<br /> zero), then the buffer size calculation in the new init_dirlist<br /> helper functions results in an underflow, allowing the XDR stream<br /> functions to write beyond the actual buffer.<br /> <br /> This calculation has always been suspect. NFSD has never sanity-<br /> checked the READDIR count argument, but the old entry encoders<br /> managed the problem correctly.<br /> <br /> With the commits below, entry encoding changed, exposing the<br /> underflow to the pointer arithmetic in xdr_reserve_space().<br /> <br /> Modern NFS clients attempt to retrieve as much data as possible<br /> for each READDIR request. Also, we have no unit tests that<br /> exercise the behavior of READDIR at the lower bound of @count<br /> values. Thus this case was missed during testing.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2024-27198

Publication date:
04/03/2024
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2024