Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-15330

Publication date:
05/02/2026
Tanium addressed an improper input validation vulnerability in Deploy.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-15331

Publication date:
05/02/2026
Tanium addressed an uncontrolled resource consumption vulnerability in Connect.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-15289

Publication date:
05/02/2026
Tanium addressed an improper access controls vulnerability in Interact.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-15311

Publication date:
05/02/2026
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-15312

Publication date:
05/02/2026
Tanium addressed an improper output sanitization vulnerability in Tanium Appliance.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-15321

Publication date:
05/02/2026
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-15323

Publication date:
05/02/2026
Tanium addressed an improper certificate validation vulnerability in Tanium Appliance.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2026-1707

Publication date:
05/02/2026
pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can observe an active restore operation, extract the `\restrict` key in real time, and race the restore process by overwriting the restore script with a payload that re-enables meta-commands using `\unrestrict `. This results in reliable command execution on the pgAdmin host during the restore operation.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-58190

Publication date:
05/02/2026
The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-68121

Publication date:
05/02/2026
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-70073

Publication date:
05/02/2026
An issue in ChestnutCMS v.1.5.8 and before allows a remote attacker to execute arbitrary code via the template creation function
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2026

CVE-2025-15551

Publication date:
05/02/2026
The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
Severity CVSS v4.0: MEDIUM
Last modification:
05/02/2026