Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-35350

Publication date:
30/05/2024
A vulnerability has been discovered in Diño Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /admin/?page=borrow/view_borrow. Manipulating the argument id can result in SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2024-35351

Publication date:
30/05/2024
A vulnerability has been discovered in Diño Physics School Assistant version 2.3. This vulnerability impacts unidentified code within the file /classes/SystemSettings.php?f=update_settings. Manipulating the parameter name results in cross-site scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2024-35352

Publication date:
30/05/2024
A vulnerability has been discovered in Diño Physics School Assistant version 2.3. This vulnerability impacts unidentified code within the file /classes/Users.php?f=save. Manipulating the parameter middlename results in cross-site scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2024-35353

Publication date:
30/05/2024
A vulnerability has been discovered in Diño Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /classes/Users.php?f=save. Manipulating the argument id can result in improper authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2024-3301

Publication date:
30/05/2024
An unsafe .NET object deserialization vulnerability in DELMIA Apriso Release 2019 through Release 2024 could lead to post-authentication remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2024

CVE-2024-5518

Publication date:
30/05/2024
A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown part of the file change_profile_picture.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266589 was assigned to this vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
11/02/2025

CVE-2024-5519

Publication date:
30/05/2024
A vulnerability classified as critical was found in ItsourceCode Learning Management System Project In PHP 1.0. This vulnerability affects unknown code of the file login.php. The manipulation of the argument user_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-266590 is the identifier assigned to this vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
11/02/2025

CVE-2024-36951

Publication date:
30/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdkfd: range check cp bad op exception interrupts<br /> <br /> Due to a CP interrupt bug, bad packet garbage exception codes are raised.<br /> Do a range check so that the debugger and runtime do not receive garbage<br /> codes.<br /> Update the user api to guard exception code type checking as well.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2024-36952

Publication date:
30/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: lpfc: Move NPIV&amp;#39;s transport unregistration to after resource clean up<br /> <br /> There are cases after NPIV deletion where the fabric switch still believes<br /> the NPIV is logged into the fabric. This occurs when a vport is<br /> unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the<br /> fabric.<br /> <br /> Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including<br /> the fabric D_ID, removes the last ndlp reference and frees the ndlp rport<br /> object. This sometimes causes the race condition where the final DA_ID and<br /> LOGO are skipped from being sent to the fabric switch.<br /> <br /> Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID<br /> and LOGO are sent.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2024-36954

Publication date:
30/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tipc: fix a possible memleak in tipc_buf_append<br /> <br /> __skb_linearize() doesn&amp;#39;t free the skb when it fails, so move<br /> &amp;#39;*buf = NULL&amp;#39; after __skb_linearize(), so that the skb can be<br /> freed on the err path.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2024-36955

Publication date:
30/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()<br /> <br /> The documentation for device_get_named_child_node() mentions this<br /> important point:<br /> <br /> "<br /> The caller is responsible for calling fwnode_handle_put() on the<br /> returned fwnode pointer.<br /> "<br /> <br /> Add fwnode_handle_put() to avoid a leaked reference.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2024-36956

Publication date:
30/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> thermal/debugfs: Free all thermal zone debug memory on zone removal<br /> <br /> Because thermal_debug_tz_remove() does not free all memory allocated for<br /> thermal zone diagnostics, some of that memory becomes unreachable after<br /> freeing the thermal zone&amp;#39;s struct thermal_debugfs object.<br /> <br /> Address this by making thermal_debug_tz_remove() free all of the memory<br /> in question.<br /> <br /> Cc :6.8+ # 6.8+
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025