Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-41250

Publication date:
07/08/2024
An Incorrect Access Control vulnerability was found in /smsa/view_students.php in Kashipara Responsive School Management System v3.2.0, which allows remote unauthenticated attackers to view STUDENT details.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2024-20443

Publication date:
07/08/2024
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.<br /> <br /> This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025

CVE-2024-20450

Publication date:
07/08/2024
Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges.<br /> <br /> These vulnerabilities exist because incoming HTTP packets are not properly checked for errors, which could result in a buffer overflow. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to overflow an internal buffer and execute arbitrary commands at the root privilege level.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2024

CVE-2024-20451

Publication date:
07/08/2024
Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly.<br /> <br /> These vulnerabilities exist because HTTP packets are not properly checked for errors. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the remote interface of an affected device. A successful exploit could allow the attacker to cause a DoS condition on the device.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2024

CVE-2024-20454

Publication date:
07/08/2024
Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges.<br /> <br /> These vulnerabilities exist because incoming HTTP packets are not properly checked for errors, which could result in a buffer overflow. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to overflow an internal buffer and execute arbitrary commands at the root privilege level.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2024

CVE-2024-20479

Publication date:
07/08/2024
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.<br /> <br /> This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have Admin privileges on an affected device.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2024

CVE-2024-7583

Publication date:
07/08/2024
A vulnerability, which was classified as critical, has been found in Tenda i22 1.0.0.3(4687). This issue affects the function formApPortalOneKeyAuth of the file /goform/apPortalOneKeyAuth. The manipulation of the argument data leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2024

CVE-2024-42242

Publication date:
07/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mmc: sdhci: Fix max_seg_size for 64KiB PAGE_SIZE<br /> <br /> blk_queue_max_segment_size() ensured:<br /> <br /> if (max_size max_segment_size
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2024

CVE-2024-42243

Publication date:
07/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray<br /> <br /> Patch series "mm/filemap: Limit page cache size to that supported by<br /> xarray", v2.<br /> <br /> Currently, xarray can&amp;#39;t support arbitrary page cache size. More details<br /> can be found from the WARN_ON() statement in xas_split_alloc(). In our<br /> test whose code is attached below, we hit the WARN_ON() on ARM64 system<br /> where the base page size is 64KB and huge page size is 512MB. The issue<br /> was reported long time ago and some discussions on it can be found here<br /> [1].<br /> <br /> [1] https://www.spinics.net/lists/linux-xfs/msg75404.html<br /> <br /> In order to fix the issue, we need to adjust MAX_PAGECACHE_ORDER to one<br /> supported by xarray and avoid PMD-sized page cache if needed. The code<br /> changes are suggested by David Hildenbrand.<br /> <br /> PATCH[1] adjusts MAX_PAGECACHE_ORDER to that supported by xarray<br /> PATCH[2-3] avoids PMD-sized page cache in the synchronous readahead path<br /> PATCH[4] avoids PMD-sized page cache for shmem files if needed<br /> <br /> Test program<br /> ============<br /> # cat test.c<br /> #define _GNU_SOURCE<br /> #include <br /> #include <br /> #include <br /> #include <br /> #include <br /> #include <br /> #include <br /> #include <br /> <br /> #define TEST_XFS_FILENAME "/tmp/data"<br /> #define TEST_SHMEM_FILENAME "/dev/shm/data"<br /> #define TEST_MEM_SIZE 0x20000000<br /> <br /> int main(int argc, char **argv)<br /> {<br /> const char *filename;<br /> int fd = 0;<br /> void *buf = (void *)-1, *p;<br /> int pgsize = getpagesize();<br /> int ret;<br /> <br /> if (pgsize != 0x10000) {<br /> fprintf(stderr, "64KB base page size is required\n");<br /> return -EPERM;<br /> }<br /> <br /> system("echo force &gt; /sys/kernel/mm/transparent_hugepage/shmem_enabled");<br /> system("rm -fr /tmp/data");<br /> system("rm -fr /dev/shm/data");<br /> system("echo 1 &gt; /proc/sys/vm/drop_caches");<br /> <br /> /* Open xfs or shmem file */<br /> filename = TEST_XFS_FILENAME;<br /> if (argc &gt; 1 &amp;&amp; !strcmp(argv[1], "shmem"))<br /> filename = TEST_SHMEM_FILENAME;<br /> <br /> fd = open(filename, O_CREAT | O_RDWR | O_TRUNC);<br /> if (fd 0)<br /> close(fd);<br /> <br /> return 0;<br /> }<br /> <br /> # gcc test.c -o test<br /> # cat /proc/1/smaps | grep KernelPageSize | head -n 1<br /> KernelPageSize: 64 kB<br /> # ./test shmem<br /> :<br /> ------------[ cut here ]------------<br /> WARNING: CPU: 17 PID: 5253 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128<br /> Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \<br /> nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \<br /> nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \<br /> ip_set nf_tables rfkill nfnetlink vfat fat virtio_balloon \<br /> drm fuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 \<br /> virtio_net sha1_ce net_failover failover virtio_console virtio_blk \<br /> dimlib virtio_mmio<br /> CPU: 17 PID: 5253 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #12<br /> Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024<br /> pstate: 83400005 (Nzcv daif +PAN -UAO +TC<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2024

CVE-2024-42248

Publication date:
07/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tty: serial: ma35d1: Add a NULL check for of_node<br /> <br /> The pdev-&gt;dev.of_node can be NULL if the "serial" node is absent.<br /> Add a NULL check to return an error in such cases.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2024

CVE-2024-42249

Publication date:
07/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> spi: don&amp;#39;t unoptimize message in spi_async()<br /> <br /> Calling spi_maybe_unoptimize_message() in spi_async() is wrong because<br /> the message is likely to be in the queue and not transferred yet. This<br /> can corrupt the message while it is being used by the controller driver.<br /> <br /> spi_maybe_unoptimize_message() is already called in the correct place<br /> in spi_finalize_current_message() to balance the call to<br /> spi_maybe_optimize_message() in spi_async().
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2024

CVE-2024-7582

Publication date:
07/08/2024
A vulnerability classified as critical was found in Tenda i22 1.0.0.3(4687). This vulnerability affects the function formApPortalAccessCodeAuth of the file /goform/apPortalAccessCodeAuth. The manipulation of the argument accessCode/data/acceInfo leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2024