Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-38394

Publication date:
19/06/2024
Missing Authorization vulnerability in Artbees JupiterX Core.This issue affects JupiterX Core: from 3.0.0 through 3.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2024

CVE-2021-47615

Publication date:
19/06/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
19/12/2024

CVE-2021-47616

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA: Fix use-after-free in rxe_queue_cleanup<br /> <br /> On error handling path in rxe_qp_from_init() qp-&gt;sq.queue is freed and<br /> then rxe_create_qp() will drop last reference to this object. qp clean up<br /> function will try to free this queue one time and it causes UAF bug.<br /> <br /> Fix it by zeroing queue pointer after freeing queue in rxe_qp_from_init().
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2022-45832

Publication date:
19/06/2024
Missing Authorization vulnerability in Hennessey Digital Attorney.This issue affects Attorney: from n/a through 3.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2024

CVE-2023-25697

Publication date:
19/06/2024
Cross-Site Request Forgery (CSRF) vulnerability in GamiPress.This issue affects GamiPress: from n/a through 2.5.6.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2024

CVE-2023-36515

Publication date:
19/06/2024
Missing Authorization vulnerability in ThimPress LearnPress.This issue affects LearnPress: from n/a through 4.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2024

CVE-2021-47605

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vduse: fix memory corruption in vduse_dev_ioctl()<br /> <br /> The "config.offset" comes from the user. There needs to a check to<br /> prevent it being out of bounds. The "config.offset" and<br /> "dev-&gt;config_size" variables are both type u32. So if the offset if<br /> out of bounds then the "dev-&gt;config_size - config.offset" subtraction<br /> results in a very high u32 value. The out of bounds offset can result<br /> in memory corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2021-47606

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: netlink: af_netlink: Prevent empty skb by adding a check on len.<br /> <br /> Adding a check on len parameter to avoid empty skb. This prevents a<br /> division error in netem_enqueue function which is caused when skb-&gt;len=0<br /> and skb-&gt;data_len=0 in the randomized corruption step as shown below.<br /> <br /> skb-&gt;data[prandom_u32() % skb_headlen(skb)] ^= 1
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2021-47607

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix kernel address leakage in atomic cmpxchg&amp;#39;s r0 aux reg<br /> <br /> The implementation of BPF_CMPXCHG on a high level has the following parameters:<br /> <br /> .-[old-val] .-[new-val]<br /> BPF_R0 = cmpxchg{32,64}(DST_REG + insn-&gt;off, BPF_R0, SRC_REG)<br /> `-[mem-loc] `-[old-val]<br /> <br /> Given a BPF insn can only have two registers (dst, src), the R0 is fixed and<br /> used as an auxilliary register for input (old value) as well as output (returning<br /> old value from memory location). While the verifier performs a number of safety<br /> checks, it misses to reject unprivileged programs where R0 contains a pointer as<br /> old value.<br /> <br /> Through brute-forcing it takes about ~16sec on my machine to leak a kernel pointer<br /> with BPF_CMPXCHG. The PoC is basically probing for kernel addresses by storing the<br /> guessed address into the map slot as a scalar, and using the map value pointer as<br /> R0 while SRC_REG has a canary value to detect a matching address.<br /> <br /> Fix it by checking R0 for pointers, and reject if that&amp;#39;s the case for unprivileged<br /> programs.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2021-47608

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix kernel address leakage in atomic fetch<br /> <br /> The change in commit 37086bfdc737 ("bpf: Propagate stack bounds to registers<br /> in atomics w/ BPF_FETCH") around check_mem_access() handling is buggy since<br /> this would allow for unprivileged users to leak kernel pointers. For example,<br /> an atomic fetch/and with -1 on a stack destination which holds a spilled<br /> pointer will migrate the spilled register type into a scalar, which can then<br /> be exported out of the program (since scalar != pointer) by dumping it into<br /> a map value.<br /> <br /> The original implementation of XADD was preventing this situation by using<br /> a double call to check_mem_access() one with BPF_READ and a subsequent one<br /> with BPF_WRITE, in both cases passing -1 as a placeholder value instead of<br /> register as per XADD semantics since it didn&amp;#39;t contain a value fetch. The<br /> BPF_READ also included a check in check_stack_read_fixed_off() which rejects<br /> the program if the stack slot is of __is_pointer_value() if dst_regno
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2024

CVE-2021-47609

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> firmware: arm_scpi: Fix string overflow in SCPI genpd driver<br /> <br /> Without the bound checks for scpi_pd-&gt;name, it could result in the buffer<br /> overflow when copying the SCPI device name from the corresponding device<br /> tree node as the name string is set at maximum size of 30.<br /> <br /> Let us fix it by using devm_kasprintf so that the string buffer is<br /> allocated dynamically.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2021-47610

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/msm: Fix null ptr access msm_ioctl_gem_submit()<br /> <br /> Fix the below null pointer dereference in msm_ioctl_gem_submit():<br /> <br /> 26545.260705: Call trace:<br /> 26545.263223: kref_put+0x1c/0x60<br /> 26545.266452: msm_ioctl_gem_submit+0x254/0x744<br /> 26545.270937: drm_ioctl_kernel+0xa8/0x124<br /> 26545.274976: drm_ioctl+0x21c/0x33c<br /> 26545.278478: drm_compat_ioctl+0xdc/0xf0<br /> 26545.282428: __arm64_compat_sys_ioctl+0xc8/0x100<br /> 26545.287169: el0_svc_common+0xf8/0x250<br /> 26545.291025: do_el0_svc_compat+0x28/0x54<br /> 26545.295066: el0_svc_compat+0x10/0x1c<br /> 26545.298838: el0_sync_compat_handler+0xa8/0xcc<br /> 26545.303403: el0_sync_compat+0x188/0x1c0<br /> 26545.307445: Code: d503201f d503201f 52800028 4b0803e8 (b8680008)<br /> 26545.318799: Kernel panic - not syncing: Oops: Fatal exception
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024