Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-52673

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix a debugfs null pointer error<br /> <br /> [WHY &amp; HOW]<br /> Check whether get_subvp_en() callback exists before calling it.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2024-34919

Publication date:
17/05/2024
An arbitrary file upload vulnerability in the component \modstudent\controller.php of Pisay Online E-Learning System using PHP/MySQL v1.0 allows attackers to execute arbitrary code via uploading a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2024

CVE-2023-52670

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rpmsg: virtio: Free driver_override when rpmsg_remove()<br /> <br /> Free driver_override when rpmsg_remove(), otherwise<br /> the following memory leak will occur:<br /> <br /> unreferenced object 0xffff0000d55d7080 (size 128):<br /> comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s)<br /> hex dump (first 32 bytes):<br /> 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsg_ns........<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> backtrace:<br /> [] __kmem_cache_alloc_node+0x1f8/0x320<br /> [] __kmalloc_node_track_caller+0x44/0x70<br /> [] kstrndup+0x4c/0x90<br /> [] driver_set_override+0xd0/0x164<br /> [] rpmsg_register_device_override+0x98/0x170<br /> [] rpmsg_ns_register_device+0x24/0x30<br /> [] rpmsg_probe+0x2e0/0x3ec<br /> [] virtio_dev_probe+0x1c0/0x280<br /> [] really_probe+0xbc/0x2dc<br /> [] __driver_probe_device+0x78/0xe0<br /> [] driver_probe_device+0xd8/0x160<br /> [] __device_attach_driver+0xb8/0x140<br /> [] bus_for_each_drv+0x7c/0xd4<br /> [] __device_attach+0x9c/0x19c<br /> [] device_initial_probe+0x14/0x20<br /> [] bus_probe_device+0xa0/0xac
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2023-52672

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pipe: wakeup wr_wait after setting max_usage<br /> <br /> Commit c73be61cede5 ("pipe: Add general notification queue support") a<br /> regression was introduced that would lock up resized pipes under certain<br /> conditions. See the reproducer in [1].<br /> <br /> The commit resizing the pipe ring size was moved to a different<br /> function, doing that moved the wakeup for pipe-&gt;wr_wait before actually<br /> raising pipe-&gt;max_usage. If a pipe was full before the resize occured it<br /> would result in the wakeup never actually triggering pipe_write.<br /> <br /> Set @max_usage and @nr_accounted before waking writers if this isn&amp;#39;t a<br /> watch queue.<br /> <br /> [Christian Brauner : rewrite to account for watch queues]
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2023-52665

Publication date:
17/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2024

CVE-2023-52666

Publication date:
17/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2024

CVE-2023-52667

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5e: fix a potential double-free in fs_any_create_groups<br /> <br /> When kcalloc() for ft-&gt;g succeeds but kvzalloc() for in fails,<br /> fs_any_create_groups() will free ft-&gt;g. However, its caller<br /> fs_any_create_table() will free ft-&gt;g again through calling<br /> mlx5e_destroy_flow_table(), which will lead to a double-free.<br /> Fix this by setting ft-&gt;g to NULL in fs_any_create_groups().
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2023-52668

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: zoned: fix lock ordering in btrfs_zone_activate()<br /> <br /> The btrfs CI reported a lockdep warning as follows by running generic<br /> generic/129.<br /> <br /> WARNING: possible circular locking dependency detected<br /> 6.7.0-rc5+ #1 Not tainted<br /> ------------------------------------------------------<br /> kworker/u5:5/793427 is trying to acquire lock:<br /> ffff88813256d028 (&amp;cache-&gt;lock){+.+.}-{2:2}, at: btrfs_zone_finish_one_bg+0x5e/0x130<br /> but task is already holding lock:<br /> ffff88810a23a318 (&amp;fs_info-&gt;zone_active_bgs_lock){+.+.}-{2:2}, at: btrfs_zone_finish_one_bg+0x34/0x130<br /> which lock already depends on the new lock.<br /> <br /> the existing dependency chain (in reverse order) is:<br /> -&gt; #1 (&amp;fs_info-&gt;zone_active_bgs_lock){+.+.}-{2:2}:<br /> ...<br /> -&gt; #0 (&amp;cache-&gt;lock){+.+.}-{2:2}:<br /> ...<br /> <br /> This is because we take fs_info-&gt;zone_active_bgs_lock after a block_group&amp;#39;s<br /> lock in btrfs_zone_activate() while doing the opposite in other places.<br /> <br /> Fix the issue by expanding the fs_info-&gt;zone_active_bgs_lock&amp;#39;s critical<br /> section and taking it before a block_group&amp;#39;s lock.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2023-52669

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> crypto: s390/aes - Fix buffer overread in CTR mode<br /> <br /> When processing the last block, the s390 ctr code will always read<br /> a whole block, even if there isn&amp;#39;t a whole block of data left. Fix<br /> this by using the actual length left and copy it into a buffer first<br /> for processing.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2023-52661

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()<br /> <br /> If clk_get_sys(..., "pll_d2_out0") fails, the clk_get_sys() call must be<br /> undone.<br /> <br /> Add the missing clk_put and a new &amp;#39;put_pll_d_out0&amp;#39; label in the error<br /> handling path, and use it.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2023-52662

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node<br /> <br /> When ida_alloc_max fails, resources allocated before should be freed,<br /> including *res allocated by kmalloc and ttm_resource_init.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2023-52663

Publication date:
17/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe()<br /> <br /> Driver uses kasprintf() to initialize fw_{code,data}_bin members of<br /> struct acp_dev_data, but kfree() is never called to deallocate the<br /> memory, which results in a memory leak.<br /> <br /> Fix the issue by switching to devm_kasprintf(). Additionally, ensure the<br /> allocation was successful by checking the pointer validity.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025