Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-10312

Publication date:
29/10/2024
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.4 via the render function in elements/tabs/tabs.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2024-50052

Publication date:
29/10/2024
Mattermost versions 9.10.x
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2024-50480

Publication date:
29/10/2024
Unrestricted Upload of File with Dangerous Type vulnerability in azexo Marketing Automation by AZEXO allows Upload a Web Shell to a Web Server.This issue affects Marketing Automation by AZEXO: from n/a through 1.27.80.
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2024

CVE-2024-10241

Publication date:
29/10/2024
Mattermost versions 9.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2025

CVE-2024-10000

Publication date:
29/10/2024
The Masteriyo LMS – eLearning and Online Course Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the question's content parameter in all versions up to, and including, 1.13.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with student-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2025

CVE-2024-10008

Publication date:
29/10/2024
The Masteriyo LMS – eLearning and Online Course Builder for WordPress plugin for WordPress is vulnerable to unauthorized user profile modification due to missing authorization checks on the /wp-json/masteriyo/v1/users/$id REST API endpoint in all versions up to, and including, 1.13.3. This makes it possible for authenticated attackers, with student-level access and above, to modify the roles of arbitrary users. As a result, attackers can escalate their privileges to the Administrator and demote existing administrators to students.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2025

CVE-2024-10479

Publication date:
29/10/2024
A vulnerability, which was classified as problematic, was found in LinZhaoguan pb-cms up to 2.0.1. Affected is an unknown function of the file /admin#themes of the component Theme Management Module. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
29/09/2025

CVE-2024-22065

Publication date:
29/10/2024
There is a command injection vulnerability in ZTE MF258 Pro product. Due to insufficient validation of Ping Diagnosis interface parameter, an authenticated attacker could use the vulnerability to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2025

CVE-2024-50080

Publication date:
29/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ublk: don&amp;#39;t allow user copy for unprivileged device<br /> <br /> UBLK_F_USER_COPY requires userspace to call write() on ublk char<br /> device for filling request buffer, and unprivileged device can&amp;#39;t<br /> be trusted.<br /> <br /> So don&amp;#39;t allow user copy for unprivileged device.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2024-50084

Publication date:
29/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()<br /> <br /> Commit a3c1e45156ad ("net: microchip: vcap: Fix use-after-free error in<br /> kunit test") fixed the use-after-free error, but introduced below<br /> memory leaks by removing necessary vcap_free_rule(), add it to fix it.<br /> <br /> unreferenced object 0xffffff80ca58b700 (size 192):<br /> comm "kunit_try_catch", pid 1215, jiffies 4294898264<br /> hex dump (first 32 bytes):<br /> 00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00 ..z.........d...<br /> 00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff ................<br /> backtrace (crc 9c09c3fe):<br /> [] kmemleak_alloc+0x34/0x40<br /> [] __kmalloc_cache_noprof+0x26c/0x2f4<br /> [] vcap_alloc_rule+0x3cc/0x9c4<br /> [] vcap_api_encode_rule_test+0x1ac/0x16b0<br /> [] kunit_try_run_case+0x13c/0x3ac<br /> [] kunit_generic_run_threadfn_adapter+0x80/0xec<br /> [] kthread+0x2e8/0x374<br /> [] ret_from_fork+0x10/0x20<br /> unreferenced object 0xffffff80cc0b0400 (size 64):<br /> comm "kunit_try_catch", pid 1215, jiffies 4294898265<br /> hex dump (first 32 bytes):<br /> 80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff ..........X.....<br /> 39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff 9...............<br /> backtrace (crc daf014e9):<br /> [] kmemleak_alloc+0x34/0x40<br /> [] __kmalloc_cache_noprof+0x26c/0x2f4<br /> [] vcap_rule_add_key+0x2cc/0x528<br /> [] vcap_api_encode_rule_test+0x224/0x16b0<br /> [] kunit_try_run_case+0x13c/0x3ac<br /> [] kunit_generic_run_threadfn_adapter+0x80/0xec<br /> [] kthread+0x2e8/0x374<br /> [] ret_from_fork+0x10/0x20<br /> unreferenced object 0xffffff80cc0b0700 (size 64):<br /> comm "kunit_try_catch", pid 1215, jiffies 4294898265<br /> hex dump (first 32 bytes):<br /> 80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff ........(.X.....<br /> 3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2024

CVE-2024-50082

Publication date:
29/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race<br /> <br /> We&amp;#39;re seeing crashes from rq_qos_wake_function that look like this:<br /> <br /> BUG: unable to handle page fault for address: ffffafe180a40084<br /> #PF: supervisor write access in kernel mode<br /> #PF: error_code(0x0002) - not-present page<br /> PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0<br /> Oops: Oops: 0002 [#1] PREEMPT SMP PTI<br /> CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014<br /> RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40<br /> Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00<br /> RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046<br /> RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011<br /> RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084<br /> RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011<br /> R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002<br /> R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003<br /> FS: 0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> try_to_wake_up+0x5a/0x6a0<br /> rq_qos_wake_function+0x71/0x80<br /> __wake_up_common+0x75/0xa0<br /> __wake_up+0x36/0x60<br /> scale_up.part.0+0x50/0x110<br /> wb_timer_fn+0x227/0x450<br /> ...<br /> <br /> So rq_qos_wake_function() calls wake_up_process(data-&gt;task), which calls<br /> try_to_wake_up(), which faults in raw_spin_lock_irqsave(&amp;p-&gt;pi_lock).<br /> <br /> p comes from data-&gt;task, and data comes from the waitqueue entry, which<br /> is stored on the waiter&amp;#39;s stack in rq_qos_wait(). Analyzing the core<br /> dump with drgn, I found that the waiter had already woken up and moved<br /> on to a completely unrelated code path, clobbering what was previously<br /> data-&gt;task. Meanwhile, the waker was passing the clobbered garbage in<br /> data-&gt;task to wake_up_process(), leading to the crash.<br /> <br /> What&amp;#39;s happening is that in between rq_qos_wake_function() deleting the<br /> waitqueue entry and calling wake_up_process(), rq_qos_wait() is finding<br /> that it already got a token and returning. The race looks like this:<br /> <br /> rq_qos_wait() rq_qos_wake_function()<br /> ==============================================================<br /> prepare_to_wait_exclusive()<br /> data-&gt;got_token = true;<br /> list_del_init(&amp;curr-&gt;entry);<br /> if (data.got_token)<br /> break;<br /> finish_wait(&amp;rqw-&gt;wait, &amp;data.wq);<br /> ^- returns immediately because<br /> list_empty_careful(&amp;wq_entry-&gt;entry)<br /> is true<br /> ... return, go do something else ...<br /> wake_up_process(data-&gt;task)<br /> (NO LONGER VALID!)-^<br /> <br /> Normally, finish_wait() is supposed to synchronize against the waker.<br /> But, as noted above, it is returning immediately because the waitqueue<br /> entry has already been removed from the waitqueue.<br /> <br /> The bug is that rq_qos_wake_function() is accessing the waitqueue entry<br /> AFTER deleting it. Note that autoremove_wake_function() wakes the waiter<br /> and THEN deletes the waitqueue entry, which is the proper order.<br /> <br /> Fix it by swapping the order. We also need to use<br /> list_del_init_careful() to match the list_empty_careful() in<br /> finish_wait().
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-50083

Publication date:
29/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tcp: fix mptcp DSS corruption due to large pmtu xmit<br /> <br /> Syzkaller was able to trigger a DSS corruption:<br /> <br /> TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.<br /> ------------[ cut here ]------------<br /> WARNING: CPU: 0 PID: 5227 at net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695<br /> Modules linked in:<br /> CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 Not tainted 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024<br /> RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695<br /> Code: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff<br /> RSP: 0018:ffffc90000006db8 EFLAGS: 00010246<br /> RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00<br /> RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 00000000000055f0<br /> RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8<br /> R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 0000000000000000<br /> R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5<br /> FS: 000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> move_skbs_to_msk net/mptcp/protocol.c:811 [inline]<br /> mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854<br /> subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490<br /> tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283<br /> tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237<br /> tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915<br /> tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2350<br /> ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205<br /> ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233<br /> NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314<br /> NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314<br /> __netif_receive_skb_one_core net/core/dev.c:5662 [inline]<br /> __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775<br /> process_backlog+0x662/0x15b0 net/core/dev.c:6107<br /> __napi_poll+0xcb/0x490 net/core/dev.c:6771<br /> napi_poll net/core/dev.c:6840 [inline]<br /> net_rx_action+0x89b/0x1240 net/core/dev.c:6962<br /> handle_softirqs+0x2c5/0x980 kernel/softirq.c:554<br /> do_softirq+0x11b/0x1e0 kernel/softirq.c:455<br /> <br /> <br /> __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382<br /> local_bh_enable include/linux/bottom_half.h:33 [inline]<br /> rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]<br /> __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451<br /> dev_queue_xmit include/linux/netdevice.h:3094 [inline]<br /> neigh_hh_output include/net/neighbour.h:526 [inline]<br /> neigh_output include/net/neighbour.h:540 [inline]<br /> ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236<br /> ip_local_out net/ipv4/ip_output.c:130 [inline]<br /> __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536<br /> __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466<br /> tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]<br /> tcp_mtu_probe net/ipv4/tcp_output.c:2547 [inline]<br /> tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752<br /> __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015<br /> tcp_push_pending_frames include/net/tcp.h:2107 [inline]<br /> tcp_data_snd_check net/ipv4/tcp_input.c:5714 [inline]<br /> tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239<br /> tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915<br /> sk_backlog_rcv include/net/sock.h:1113 [inline]<br /> __release_sock+0x214/0x350 net/core/sock.c:3072<br /> release_sock+0x61/0x1f0 net/core/sock.c:3626<br /> mptcp_push_<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025