Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-1762

Publication date:
22/05/2024
The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTTP_USER_AGENT header in all versions up to, and including, 4.4.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This requires the victim to select view "All Cron Events" in order for the injection to fire.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2024-2088

Publication date:
22/05/2024
The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.4.3 via the 'nxs_getExpSettings' function. This makes it possible for authenticated attackers, with subscriber access and above, to extract sensitive data including social network API keys and secrets.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2025

CVE-2021-47461

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> userfaultfd: fix a race between writeprotect and exit_mmap()<br /> <br /> A race is possible when a process exits, its VMAs are removed by<br /> exit_mmap() and at the same time userfaultfd_writeprotect() is called.<br /> <br /> The race was detected by KASAN on a development kernel, but it appears<br /> to be possible on vanilla kernels as well.<br /> <br /> Use mmget_not_zero() to prevent the race as done in other userfaultfd<br /> operations.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2025

CVE-2021-47462

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()<br /> <br /> syzbot reported access to unitialized memory in mbind() [1]<br /> <br /> Issue came with commit bda420b98505 ("numa balancing: migrate on fault<br /> among multiple bound nodes")<br /> <br /> This commit added a new bit in MPOL_MODE_FLAGS, but only checked valid<br /> combination (MPOL_F_NUMA_BALANCING can only be used with MPOL_BIND) in<br /> do_set_mempolicy()<br /> <br /> This patch moves the check in sanitize_mpol_flags() so that it is also<br /> used by mbind()<br /> <br /> [1]<br /> BUG: KMSAN: uninit-value in __mpol_equal+0x567/0x590 mm/mempolicy.c:2260<br /> __mpol_equal+0x567/0x590 mm/mempolicy.c:2260<br /> mpol_equal include/linux/mempolicy.h:105 [inline]<br /> vma_merge+0x4a1/0x1e60 mm/mmap.c:1190<br /> mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811<br /> do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333<br /> kernel_mbind mm/mempolicy.c:1483 [inline]<br /> __do_sys_mbind mm/mempolicy.c:1490 [inline]<br /> __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486<br /> __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486<br /> do_syscall_x64 arch/x86/entry/common.c:51 [inline]<br /> do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> <br /> Uninit was created at:<br /> slab_alloc_node mm/slub.c:3221 [inline]<br /> slab_alloc mm/slub.c:3230 [inline]<br /> kmem_cache_alloc+0x751/0xff0 mm/slub.c:3235<br /> mpol_new mm/mempolicy.c:293 [inline]<br /> do_mbind+0x912/0x15f0 mm/mempolicy.c:1289<br /> kernel_mbind mm/mempolicy.c:1483 [inline]<br /> __do_sys_mbind mm/mempolicy.c:1490 [inline]<br /> __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486<br /> __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486<br /> do_syscall_x64 arch/x86/entry/common.c:51 [inline]<br /> do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> =====================================================<br /> Kernel panic - not syncing: panic_on_kmsan set ...<br /> CPU: 0 PID: 15049 Comm: syz-executor.0 Tainted: G B 5.15.0-rc2-syzkaller #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011<br /> Call Trace:<br /> __dump_stack lib/dump_stack.c:88 [inline]<br /> dump_stack_lvl+0x1ff/0x28e lib/dump_stack.c:106<br /> dump_stack+0x25/0x28 lib/dump_stack.c:113<br /> panic+0x44f/0xdeb kernel/panic.c:232<br /> kmsan_report+0x2ee/0x300 mm/kmsan/report.c:186<br /> __msan_warning+0xd7/0x150 mm/kmsan/instrumentation.c:208<br /> __mpol_equal+0x567/0x590 mm/mempolicy.c:2260<br /> mpol_equal include/linux/mempolicy.h:105 [inline]<br /> vma_merge+0x4a1/0x1e60 mm/mmap.c:1190<br /> mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811<br /> do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333<br /> kernel_mbind mm/mempolicy.c:1483 [inline]<br /> __do_sys_mbind mm/mempolicy.c:1490 [inline]<br /> __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486<br /> __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486<br /> do_syscall_x64 arch/x86/entry/common.c:51 [inline]<br /> do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2025

CVE-2021-47463

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/secretmem: fix NULL page-&gt;mapping dereference in page_is_secretmem()<br /> <br /> Check for a NULL page-&gt;mapping before dereferencing the mapping in<br /> page_is_secretmem(), as the page&amp;#39;s mapping can be nullified while gup()<br /> is running, e.g. by reclaim or truncation.<br /> <br /> BUG: kernel NULL pointer dereference, address: 0000000000000068<br /> #PF: supervisor read access in kernel mode<br /> #PF: error_code(0x0000) - not-present page<br /> PGD 0 P4D 0<br /> Oops: 0000 [#1] PREEMPT SMP NOPTI<br /> CPU: 6 PID: 4173897 Comm: CPU 3/KVM Tainted: G W<br /> RIP: 0010:internal_get_user_pages_fast+0x621/0x9d0<br /> Code: 81 7a 68 80 08 04 bc 0f 85 21 ff ff 8 89 c7 be<br /> RSP: 0018:ffffaa90087679b0 EFLAGS: 00010046<br /> RAX: ffffe3f37905b900 RBX: 00007f2dd561e000 RCX: ffffe3f37905b934<br /> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffe3f37905b900<br /> ...<br /> CR2: 0000000000000068 CR3: 00000004c5898003 CR4: 00000000001726e0<br /> Call Trace:<br /> get_user_pages_fast_only+0x13/0x20<br /> hva_to_pfn+0xa9/0x3e0<br /> try_async_pf+0xa1/0x270<br /> direct_page_fault+0x113/0xad0<br /> kvm_mmu_page_fault+0x69/0x680<br /> vmx_handle_exit+0xe1/0x5d0<br /> kvm_arch_vcpu_ioctl_run+0xd81/0x1c70<br /> kvm_vcpu_ioctl+0x267/0x670<br /> __x64_sys_ioctl+0x83/0xa0<br /> do_syscall_64+0x56/0x80<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2025

CVE-2021-47464

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> audit: fix possible null-pointer dereference in audit_filter_rules<br /> <br /> Fix possible null-pointer dereference in audit_filter_rules.<br /> <br /> audit_filter_rules() error: we previously assumed &amp;#39;ctx&amp;#39; could be null
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-47465

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()<br /> <br /> In commit 10d91611f426 ("powerpc/64s: Reimplement book3s idle code in<br /> C") kvm_start_guest() became idle_kvm_start_guest(). The old code<br /> allocated a stack frame on the emergency stack, but didn&amp;#39;t use the<br /> frame to store anything, and also didn&amp;#39;t store anything in its caller&amp;#39;s<br /> frame.<br /> <br /> idle_kvm_start_guest() on the other hand is written more like a normal C<br /> function, it creates a frame on entry, and also stores CR/LR into its<br /> callers frame (per the ABI). The problem is that there is no caller<br /> frame on the emergency stack.<br /> <br /> The emergency stack for a given CPU is allocated with:<br /> <br /> paca_ptrs[i]-&gt;emergency_sp = alloc_stack(limit, i) + THREAD_SIZE;<br /> <br /> So emergency_sp actually points to the first address above the emergency<br /> stack allocation for a given CPU, we must not store above it without<br /> first decrementing it to create a frame. This is different to the<br /> regular kernel stack, paca-&gt;kstack, which is initialised to point at an<br /> initial frame that is ready to use.<br /> <br /> idle_kvm_start_guest() stores the backchain, CR and LR all of which<br /> write outside the allocation for the emergency stack. It then creates a<br /> stack frame and saves the non-volatile registers. Unfortunately the<br /> frame it creates is not large enough to fit the non-volatiles, and so<br /> the saving of the non-volatile registers also writes outside the<br /> emergency stack allocation.<br /> <br /> The end result is that we corrupt whatever is at 0-24 bytes, and 112-248<br /> bytes above the emergency stack allocation.<br /> <br /> In practice this has gone unnoticed because the memory immediately above<br /> the emergency stack happens to be used for other stack allocations,<br /> either another CPUs mc_emergency_sp or an IRQ stack. See the order of<br /> calls to irqstack_early_init() and emergency_stack_init().<br /> <br /> The low addresses of another stack are the top of that stack, and so are<br /> only used if that stack is under extreme pressue, which essentially<br /> never happens in practice - and if it did there&amp;#39;s a high likelyhood we&amp;#39;d<br /> crash due to that stack overflowing.<br /> <br /> Still, we shouldn&amp;#39;t be corrupting someone else&amp;#39;s stack, and it is purely<br /> luck that we aren&amp;#39;t corrupting something else.<br /> <br /> To fix it we save CR/LR into the caller&amp;#39;s frame using the existing r1 on<br /> entry, we then create a SWITCH_FRAME_SIZE frame (which has space for<br /> pt_regs) on the emergency stack with the backchain pointing to the<br /> existing stack, and then finally we switch to the new frame on the<br /> emergency stack.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2025

CVE-2021-47466

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm, slub: fix potential memoryleak in kmem_cache_open()<br /> <br /> In error path, the random_seq of slub cache might be leaked. Fix this<br /> by using __kmem_cache_release() to release all the relevant resources.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2021-47467

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> kunit: fix reference count leak in kfree_at_end<br /> <br /> The reference counting issue happens in the normal path of<br /> kfree_at_end(). When kunit_alloc_and_get_resource() is invoked, the<br /> function forgets to handle the returned resource object, whose refcount<br /> increased inside, causing a refcount leak.<br /> <br /> Fix this issue by calling kunit_alloc_resource() instead of<br /> kunit_alloc_and_get_resource().<br /> <br /> Fixed the following when applying:<br /> Shuah Khan <br /> <br /> CHECK: Alignment should match open parenthesis<br /> + kunit_alloc_resource(test, NULL, kfree_res_free, GFP_KERNEL,<br /> (void *)to_free);
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-47468

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> isdn: mISDN: Fix sleeping function called from invalid context<br /> <br /> The driver can call card-&gt;isac.release() function from an atomic<br /> context.<br /> <br /> Fix this by calling this function after releasing the lock.<br /> <br /> The following log reveals it:<br /> <br /> [ 44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018<br /> [ 44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe<br /> [ 44.169574 ] INFO: lockdep is turned off.<br /> [ 44.169899 ] irq event stamp: 0<br /> [ 44.170160 ] hardirqs last enabled at (0): [] 0x0<br /> [ 44.170627 ] hardirqs last disabled at (0): [] copy_process+0x132d/0x3e00<br /> [ 44.171240 ] softirqs last enabled at (0): [] copy_process+0x135a/0x3e00<br /> [ 44.171852 ] softirqs last disabled at (0): [] 0x0<br /> [ 44.172318 ] Preemption disabled at:<br /> [ 44.172320 ] [] nj_release+0x69/0x500 [netjet]<br /> [ 44.174441 ] Call Trace:<br /> [ 44.174630 ] dump_stack_lvl+0xa8/0xd1<br /> [ 44.174912 ] dump_stack+0x15/0x17<br /> [ 44.175166 ] ___might_sleep+0x3a2/0x510<br /> [ 44.175459 ] ? nj_release+0x69/0x500 [netjet]<br /> [ 44.175791 ] __might_sleep+0x82/0xe0<br /> [ 44.176063 ] ? start_flush_work+0x20/0x7b0<br /> [ 44.176375 ] start_flush_work+0x33/0x7b0<br /> [ 44.176672 ] ? trace_irq_enable_rcuidle+0x85/0x170<br /> [ 44.177034 ] ? kasan_quarantine_put+0xaa/0x1f0<br /> [ 44.177372 ] ? kasan_quarantine_put+0xaa/0x1f0<br /> [ 44.177711 ] __flush_work+0x11a/0x1a0<br /> [ 44.177991 ] ? flush_work+0x20/0x20<br /> [ 44.178257 ] ? lock_release+0x13c/0x8f0<br /> [ 44.178550 ] ? __kasan_check_write+0x14/0x20<br /> [ 44.178872 ] ? do_raw_spin_lock+0x148/0x360<br /> [ 44.179187 ] ? read_lock_is_recursive+0x20/0x20<br /> [ 44.179530 ] ? __kasan_check_read+0x11/0x20<br /> [ 44.179846 ] ? do_raw_spin_unlock+0x55/0x900<br /> [ 44.180168 ] ? ____kasan_slab_free+0x116/0x140<br /> [ 44.180505 ] ? _raw_spin_unlock_irqrestore+0x41/0x60<br /> [ 44.180878 ] ? skb_queue_purge+0x1a3/0x1c0<br /> [ 44.181189 ] ? kfree+0x13e/0x290<br /> [ 44.181438 ] flush_work+0x17/0x20<br /> [ 44.181695 ] mISDN_freedchannel+0xe8/0x100<br /> [ 44.182006 ] isac_release+0x210/0x260 [mISDNipac]<br /> [ 44.182366 ] nj_release+0xf6/0x500 [netjet]<br /> [ 44.182685 ] nj_remove+0x48/0x70 [netjet]<br /> [ 44.182989 ] pci_device_remove+0xa9/0x250
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2025

CVE-2021-47469

Publication date:
22/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2025

CVE-2021-47470

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm, slub: fix potential use-after-free in slab_debugfs_fops<br /> <br /> When sysfs_slab_add failed, we shouldn&amp;#39;t call debugfs_slab_add() for s<br /> because s will be freed soon. And slab_debugfs_fops will use s later<br /> leading to a use-after-free.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025