Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-65501

Publication date:
24/11/2025
Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-65493

Publication date:
24/11/2025
NULL pointer dereference in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS/TLS connection that triggers BIO_get_data() to return NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-65494

Publication date:
24/11/2025
NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted X.509 certificate that causes sk_GENERAL_NAME_value() to return NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-41016

Publication date:
24/11/2025
Inadequate access control vulnerability in Davantis DFUSION v6.177.7, which allows unauthorised actors to extract images and videos related to alarm events through access to “/alarms//”, where the “MEDIA” parameter can take the value of “snapshot” or “video.mp4”. These media files contain images recorded by security cameras in response to triggered alerts.
Severity CVSS v4.0: HIGH
Last modification:
24/11/2025

CVE-2025-41017

Publication date:
24/11/2025
Inadequate access control vulnerability in Davantis DDFUSION v6.177.7, which allows unauthorised actors to retrieve perspective parameters from security camera settings by accessing “/cameras//perspective”.
Severity CVSS v4.0: MEDIUM
Last modification:
24/11/2025

CVE-2025-40212

Publication date:
24/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfsd: fix refcount leak in nfsd_set_fh_dentry()<br /> <br /> nfsd exports a "pseudo root filesystem" which is used by NFSv4 to find<br /> the various exported filesystems using LOOKUP requests from a known root<br /> filehandle. NFSv3 uses the MOUNT protocol to find those exported<br /> filesystems and so is not given access to the pseudo root filesystem.<br /> <br /> If a v3 (or v2) client uses a filehandle from that filesystem,<br /> nfsd_set_fh_dentry() will report an error, but still stores the export<br /> in "struct svc_fh" even though it also drops the reference (exp_put()).<br /> This means that when fh_put() is called an extra reference will be dropped<br /> which can lead to use-after-free and possible denial of service.<br /> <br /> Normal NFS usage will not provide a pseudo-root filehandle to a v3<br /> client. This bug can only be triggered by the client synthesising an<br /> incorrect filehandle.<br /> <br /> To fix this we move the assignments to the svc_fh later, after all<br /> possible error cases have been detected.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-12628

Publication date:
24/11/2025
The WP 2FA WordPress plugin does not generate backup codes with enough entropy, which could allow attackers to bypass the second factor by brute forcing them
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-41087

Publication date:
24/11/2025
Cross-Site Scripting (XSS) vulnerability stored in tha Taclia web application, where the uploaded SVG images are not properly sanitized. This allows to the attackers to embed malicious scripts in SVG files such as image profiles, which are then stored on the server and executed in the context of any user who accesses the compromised resource.
Severity CVSS v4.0: MEDIUM
Last modification:
24/11/2025

CVE-2025-41729

Publication date:
24/11/2025
An unauthenticated remote attacker can send a specially crafted Modbus read command to the device which leads to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-12740

Publication date:
24/11/2025
A Looker user with a Developer role could create a database connection using IBM DB2 driver and, by manipulating LookML, cause Looker to execute a malicious command, due to inadequate filtering of the driver&amp;#39;s parameters.<br /> <br /> Looker-hosted and Self-hosted were found to be vulnerable.<br /> This issue has already been mitigated for Looker-hosted instances. No user action is required for these.<br /> <br /> <br /> Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.<br /> The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :<br /> * 25.0.93+<br /> * 25.6.84+<br /> <br /> * 25.12.42+<br /> * 25.14.50+<br /> * 25.16.44+
Severity CVSS v4.0: HIGH
Last modification:
24/11/2025

CVE-2025-12741

Publication date:
24/11/2025
A Looker user with Developer role could create a database connection using Denodo driver and, by manipulating LookML, cause Looker to execute a malicious command.<br /> <br /> Looker-hosted and Self-hosted were found to be vulnerable.<br /> This issue has already been mitigated for Looker-hosted instances. No user action is required for these.<br /> <br /> <br /> Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.<br /> The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :<br /> * 24.12.108+<br /> * 24.18.200+<br /> * 25.0.78+<br /> * 25.6.65+<br /> * 25.8.47+<br /> * 25.12.10+<br /> * 25.14+
Severity CVSS v4.0: HIGH
Last modification:
24/11/2025

CVE-2025-12739

Publication date:
24/11/2025
An attacker with viewer permissions in Looker could craft a malicious URL that, when opened by a Looker admin, would execute an attacker-supplied script. Exploitation required at least one Looker extension installed on the instance.<br /> <br /> Looker-hosted and Self-hosted were found to be vulnerable.<br /> This issue has already been mitigated for Looker-hosted instances. No user action is required for these.<br /> <br /> <br /> Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.<br /> The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.18.201+<br /> * 25.0.79+<br /> * 25.6.66+<br /> * 25.12.7+<br /> * 25.16.0+<br /> * 25.18.0+<br /> * 25.20.0+
Severity CVSS v4.0: HIGH
Last modification:
24/11/2025