Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-50066

Publication date:
23/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/mremap: fix move_normal_pmd/retract_page_tables race<br /> <br /> In mremap(), move_page_tables() looks at the type of the PMD entry and the<br /> specified address range to figure out by which method the next chunk of<br /> page table entries should be moved.<br /> <br /> At that point, the mmap_lock is held in write mode, but no rmap locks are<br /> held yet. For PMD entries that point to page tables and are fully covered<br /> by the source address range, move_pgt_entry(NORMAL_PMD, ...) is called,<br /> which first takes rmap locks, then does move_normal_pmd(). <br /> move_normal_pmd() takes the necessary page table locks at source and<br /> destination, then moves an entire page table from the source to the<br /> destination.<br /> <br /> The problem is: The rmap locks, which protect against concurrent page<br /> table removal by retract_page_tables() in the THP code, are only taken<br /> after the PMD entry has been read and it has been decided how to move it. <br /> So we can race as follows (with two processes that have mappings of the<br /> same tmpfs file that is stored on a tmpfs mount with huge=advise); note<br /> that process A accesses page tables through the MM while process B does it<br /> through the file rmap:<br /> <br /> process A process B<br /> ========= =========<br /> mremap<br /> mremap_to<br /> move_vma<br /> move_page_tables<br /> get_old_pmd<br /> alloc_new_pmd<br /> *** PREEMPT ***<br /> madvise(MADV_COLLAPSE)<br /> do_madvise<br /> madvise_walk_vmas<br /> madvise_vma_behavior<br /> madvise_collapse<br /> hpage_collapse_scan_file<br /> collapse_file<br /> retract_page_tables<br /> i_mmap_lock_read(mapping)<br /> pmdp_collapse_flush<br /> i_mmap_unlock_read(mapping)<br /> move_pgt_entry(NORMAL_PMD, ...)<br /> take_rmap_locks<br /> move_normal_pmd<br /> drop_rmap_locks<br /> <br /> When this happens, move_normal_pmd() can end up creating bogus PMD entries<br /> in the line `pmd_populate(mm, new_pmd, pmd_pgtable(pmd))`. The effect<br /> depends on arch-specific and machine-specific details; on x86, you can end<br /> up with physical page 0 mapped as a page table, which is likely<br /> exploitable for user-&gt;kernel privilege escalation.<br /> <br /> Fix the race by letting process B recheck that the PMD still points to a<br /> page table after the rmap locks have been taken. Otherwise, we bail and<br /> let the caller fall back to the PTE-level copying path, which will then<br /> bail immediately at the pmd_none() check.<br /> <br /> Bug reachability: Reaching this bug requires that you can create<br /> shmem/file THP mappings - anonymous THP uses different code that doesn&amp;#39;t<br /> zap stuff under rmap locks. File THP is gated on an experimental config<br /> flag (CONFIG_READ_ONLY_THP_FOR_FS), so on normal distro kernels you need<br /> shmem THP to hit this bug. As far as I know, getting shmem THP normally<br /> requires that you can mount your own tmpfs with the right mount flags,<br /> which would require creating your own user+mount namespace; though I don&amp;#39;t<br /> know if some distros maybe enable shmem THP by default or something like<br /> that.<br /> <br /> Bug impact: This issue can likely be used for user-&gt;kernel privilege<br /> escalation when it is reachable.
Severity CVSS v4.0: Pending analysis
Last modification:
07/03/2025

CVE-2024-9927

Publication date:
23/10/2024
The WooCommerce Order Proposal plugin for WordPress is vulnerable to privilege escalation via order proposal in all versions up to and including 2.0.5. This is due to the improper implementation of allow_payment_without_login function. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to log in to WordPress as an arbitrary user account, including administrators.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-31880

Publication date:
23/10/2024
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-7587

Publication date:
22/10/2024
Incorrect Default Permissions vulnerability in GenBroker32, which is included in the installers for Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric GENESIS32 versions 9.70.300.23 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.70.300.23 and prior, and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to disclose or tamper with confidential information and data contained in the products, or cause a denial of service (DoS) condition on the products, by accessing a folder with incorrect permissions, when GenBroker32 is installed on the same PC as GENESIS64, ICONICS Suite, MC Works64, or GENESIS32.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2024-48652

Publication date:
22/10/2024
Cross Site Scripting vulnerability in camaleon-cms v.2.7.5 allows remote attacker to execute arbitrary code via the content group name field.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-48656

Publication date:
22/10/2024
Cross Site Scripting vulnerability in student management system in php with source code v.1.0.0 allows a remote attacker to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2024

CVE-2024-48657

Publication date:
22/10/2024
SQL Injection vulnerability in hospital management system in php with source code v.1.0.0 allows a remote attacker to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2024

CVE-2024-43812

Publication date:
22/10/2024
Kieback &amp; Peter&amp;#39;s DDC4000 series has an insufficiently protected credentials vulnerability, which may allow an unauthenticated attacker with access to /etc/passwd to read the password hashes of all users on the system.
Severity CVSS v4.0: HIGH
Last modification:
23/10/2024

CVE-2024-44331

Publication date:
22/10/2024
Incorrect Access Control in GStreamer RTSP server 1.25.0 in gst-rtsp-server/rtsp-media.c allows remote attackers to cause a denial of service via a series of specially crafted hexstream requests.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2024

CVE-2024-44812

Publication date:
22/10/2024
SQL Injection vulnerability in Online Complaint Site v.1.0 allows a remote attacker to escalate privileges via the username and password parameters in the /admin.index.php component.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2024

CVE-2024-46482

Publication date:
22/10/2024
An arbitrary file upload vulnerability in the Ticket Generation function of Ladybird Web Solution Faveo-Helpdesk v2.0.3 allows attackers to execute arbitrary code via uploading a crafted .html or .svg file.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2024

CVE-2024-46483

Publication date:
22/10/2024
Xlight FTP Server
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2024