Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-2896

Publication date:
26/03/2024
A vulnerability was found in Tenda AC7 15.03.06.44. It has been rated as critical. This issue affects the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257939. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2025

CVE-2024-26647

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix late derefrence &amp;#39;dsc&amp;#39; check in &amp;#39;link_set_dsc_pps_packet()&amp;#39;<br /> <br /> In link_set_dsc_pps_packet(), &amp;#39;struct display_stream_compressor *dsc&amp;#39;<br /> was dereferenced in a DC_LOGGER_INIT(dsc-&gt;ctx-&gt;logger); before the &amp;#39;dsc&amp;#39;<br /> NULL pointer check.<br /> <br /> Fixes the below:<br /> drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check &amp;#39;dsc&amp;#39; (see line 903)
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2024-26648

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()<br /> <br /> In edp_setup_replay(), &amp;#39;struct dc *dc&amp;#39; &amp; &amp;#39;struct dmub_replay *replay&amp;#39;<br /> was dereferenced before the pointer &amp;#39;link&amp;#39; &amp; &amp;#39;replay&amp;#39; NULL check.<br /> <br /> Fixes the below:<br /> drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() warn: variable dereferenced before check &amp;#39;link&amp;#39; (see line 933)
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2024-26649

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Fix the null pointer when load rlc firmware<br /> <br /> If the RLC firmware is invalid because of wrong header size,<br /> the pointer to the rlc firmware is released in function<br /> amdgpu_ucode_request. There will be a null pointer error<br /> in subsequent use. So skip validation to fix it.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2025

CVE-2024-26650

Publication date:
26/03/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
23/05/2024

CVE-2024-2895

Publication date:
26/03/2024
A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. This vulnerability affects the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257938 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2025

CVE-2024-26646

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> thermal: intel: hfi: Add syscore callbacks for system-wide PM<br /> <br /> The kernel allocates a memory buffer and provides its location to the<br /> hardware, which uses it to update the HFI table. This allocation occurs<br /> during boot and remains constant throughout runtime.<br /> <br /> When resuming from hibernation, the restore kernel allocates a second<br /> memory buffer and reprograms the HFI hardware with the new location as<br /> part of a normal boot. The location of the second memory buffer may<br /> differ from the one allocated by the image kernel.<br /> <br /> When the restore kernel transfers control to the image kernel, its HFI<br /> buffer becomes invalid, potentially leading to memory corruption if the<br /> hardware writes to it (the hardware continues to use the buffer from the<br /> restore kernel).<br /> <br /> It is also possible that the hardware "forgets" the address of the memory<br /> buffer when resuming from "deep" suspend. Memory corruption may also occur<br /> in such a scenario.<br /> <br /> To prevent the described memory corruption, disable HFI when preparing to<br /> suspend or hibernate. Enable it when resuming.<br /> <br /> Add syscore callbacks to handle the package of the boot CPU (packages of<br /> non-boot CPUs are handled via CPU offline). Syscore ops always run on the<br /> boot CPU. Additionally, HFI only needs to be disabled during "deep" suspend<br /> and hibernation. Syscore ops only run in these cases.<br /> <br /> [ rjw: Comment adjustment, subject and changelog edits ]
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2023-52625

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Refactor DMCUB enter/exit idle interface<br /> <br /> [Why]<br /> We can hang in place trying to send commands when the DMCUB isn&amp;#39;t<br /> powered on.<br /> <br /> [How]<br /> We need to exit out of the idle state prior to sending a command,<br /> but the process that performs the exit also invokes a command itself.<br /> <br /> Fixing this issue involves the following:<br /> <br /> 1. Using a software state to track whether or not we need to start<br /> the process to exit idle or notify idle.<br /> <br /> It&amp;#39;s possible for the hardware to have exited an idle state without<br /> driver knowledge, but entering one is always restricted to a driver<br /> allow - which makes the SW state vs HW state mismatch issue purely one<br /> of optimization, which should seldomly be hit, if at all.<br /> <br /> 2. Refactor any instances of exit/notify idle to use a single wrapper<br /> that maintains this SW state.<br /> <br /> This works simialr to dc_allow_idle_optimizations, but works at the<br /> DMCUB level and makes sure the state is marked prior to any notify/exit<br /> idle so we don&amp;#39;t enter an infinite loop.<br /> <br /> 3. Make sure we exit out of idle prior to sending any commands or<br /> waiting for DMCUB idle.<br /> <br /> This patch takes care of 1/2. A future patch will take care of wrapping<br /> DMCUB command submission with calls to this new interface.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2023-52626

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context<br /> <br /> Indirection (*) is of lower precedence than postfix increment (++). Logic<br /> in napi_poll context would cause an out-of-bound read by first increment<br /> the pointer address by byte address space and then dereference the value.<br /> Rather, the intended logic was to dereference first and then increment the<br /> underlying value.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2023-52627

Publication date:
26/03/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iio: adc: ad7091r: Allow users to configure device events<br /> <br /> AD7091R-5 devices are supported by the ad7091r-5 driver together with<br /> the ad7091r-base driver. Those drivers declared iio events for notifying<br /> user space when ADC readings fall bellow the thresholds of low limit<br /> registers or above the values set in high limit registers.<br /> However, to configure iio events and their thresholds, a set of callback<br /> functions must be implemented and those were not present until now.<br /> The consequence of trying to configure ad7091r-5 events without the<br /> proper callback functions was a null pointer dereference in the kernel<br /> because the pointers to the callback functions were not set.<br /> <br /> Implement event configuration callbacks allowing users to read/write<br /> event thresholds and enable/disable event generation.<br /> <br /> Since the event spec structs are generic to AD7091R devices, also move<br /> those from the ad7091r-5 driver the base driver so they can be reused<br /> when support for ad7091r-2/-4/-8 be added.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2024-1313

Publication date:
26/03/2024
It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/ using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.<br /> <br /> Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo <br /> Alto Research for discovering and disclosing this vulnerability.<br /> <br /> This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2023-44989

Publication date:
26/03/2024
Insertion of Sensitive Information into Log File vulnerability in GSheetConnector CF7 Google Sheets Connector.This issue affects CF7 Google Sheets Connector: from n/a through 5.0.5.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/03/2024