Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-2400

Publication date:
16/04/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2025

CVE-2025-2073

Publication date:
16/04/2025
Out-of-Bounds Read in netfilter/ipset in Linux Kernel ChromeOS [6.1, 5.15, 5.10, 5.4, 4.19] allows a local attacker with low privileges to trigger an out-of-bounds read, potentially leading to information disclosure
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2025-0756

Publication date:
16/04/2025
Overview <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Description <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Hitachi Vantara Pentaho Data Integration &amp; Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources. <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Impact <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> An attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-0757

Publication date:
16/04/2025
Overview<br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> The software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Description <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Impact <br /> <br /> <br /> <br />  <br /> <br /> <br /> <br /> Once the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim&amp;#39;s machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-0758

Publication date:
16/04/2025
Overview <br /> <br /> <br /> <br /> The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. (CWE-732) <br /> <br /> <br /> <br /> Description <br /> <br /> <br /> <br /> Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, is installed with Karaf JMX beans enabled and accessible by default. <br /> <br /> <br /> <br /> Impact <br /> <br /> <br /> <br /> When the vulnerability is leveraged, a user with local execution privileges can access functionality exposed by Karaf beans contained in the product.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-1566

Publication date:
16/04/2025
DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2025-1568

Publication date:
16/04/2025
or other security impacts via manipulating IPSET_ATTR_CIDR Netlink attribute without proper bounds checking on the modified IP address in bitmap_ip_uadt
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2025-1704

Publication date:
16/04/2025
ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 15823.23.0 on Chromebooks allows enrolled users with local access to unenroll devices <br /> and intercept device management requests via loading components from the unencrypted stateful partition.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2025-43703

Publication date:
16/04/2025
An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-25230

Publication date:
16/04/2025
Omnissa Horizon Client for Windows contains an LPE Vulnerability. A malicious actor with local access where Horizon Client for Windows is installed may be able to elevate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-31478

Publication date:
16/04/2025
Zulip is an open-source team collaboration tool. Zulip supports a configuration where account creation is limited solely by being able to authenticate with a single-sign on authentication backend, meaning the organization places no restrictions on email address domains or invitations being required to join, but has disabled the EmailAuthBackend that is used for email/password authentication. A bug in the Zulip server means that it is possible to create an account in such organizations, without having an account with the configured SSO authentication backend. This issue is patched in version 10.2. A workaround includes requiring invitations to join the organization prevents the vulnerability from being accessed.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-32787

Publication date:
16/04/2025
SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. Versions 5.02.5184 to 5.02.5187 are vulnerable to NULL dereference in `DeleteIPv6DefaultRouterInRA` called by `StorePacket`. Before dereferencing, `DeleteIPv6DefaultRouterInRA` does not account for `ParsePacket` returning NULL, resulting in the program crashing. A patched version does not exist at this time.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025