Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-34306

Publication date:
28/10/2025
IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the pienumber parameter when updating the default firewall IP search values. When a user updates these defaults, the application issues an HTTP POST request to /cgi-bin/logs.cgi/firewalllogip.dat with the default number of IPs in the pienumber parameter. The value of this parameter is stored and later rendered in the web interface without proper sanitation or encoding, allowing injected scripts to execute in the context of other users who view the affected page.
Severity CVSS v4.0: MEDIUM
Last modification:
03/11/2025

CVE-2025-34307

Publication date:
28/10/2025
IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code through the pienumber parameter when updating the firewall country search defaults. When a user updates the default values for the firewall country search, the application issues an HTTP POST request to /cgi-bin/logs.cgi/firewalllogcountry.dat and the default number of countries to display is provided in the pienumber parameter. The value of this parameter is stored and later rendered in the web interface without proper sanitation or encoding, allowing injected scripts to execute in the context of other users who view the affected firewall country search settings.
Severity CVSS v4.0: MEDIUM
Last modification:
03/11/2025

CVE-2025-53855

Publication date:
28/10/2025
An out-of-bounds write vulnerability exists in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .fadein file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-53814

Publication date:
28/10/2025
A use-after-free vulnerability exists in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .xml file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-12380

Publication date:
28/10/2025
Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-12390

Publication date:
28/10/2025
A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly during logout when browser cookies are missing. As a result, one user may receive tokens that belong to another user.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-12103

Publication date:
28/10/2025
A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster.<br /> <br /> TrustyAI is creating a role `trustyai-service-operator-lmeval-user-role` and a CRB `trustyai-service-operator-default-lmeval-user-rolebinding` which is being applied to `system:authenticated` making it so that every single user or service account can get a list of pods running in any namespace on the cluster <br /> <br /> Additionally users can access all `persistentvolumeclaims` and `lmevaljobs`
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-1036

Publication date:
28/10/2025
Command injection vulnerability exists in the “Logging” page of the web-based configuration utility. An authenticated user with low privileged network access for the configuration utility can execute arbitrary commands on the underlying OS to obtain root SSH access to the TropOS 4th Gen device.
Severity CVSS v4.0: HIGH
Last modification:
30/10/2025

CVE-2025-1037

Publication date:
28/10/2025
By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allow for certain commands to be run as root from an unprivileged context.
Severity CVSS v4.0: HIGH
Last modification:
30/10/2025

CVE-2025-1038

Publication date:
28/10/2025
The “Diagnostics Tools” page of the web-based configuration utility does not properly validate user-controlled input, allowing an authenticated user with high privileges to inject commands into the command shell of the TropOS 4th Gen device. The injected commands can be exploited to execute several set-uid (SUID) applications to ultimately gain root access to the TropOS device.
Severity CVSS v4.0: HIGH
Last modification:
30/10/2025

CVE-2025-40075

Publication date:
28/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tcp_metrics: use dst_dev_net_rcu()<br /> <br /> Replace three dst_dev() with a lockdep enabled helper.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-40076

Publication date:
28/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: rcar-host: Pass proper IRQ domain to generic_handle_domain_irq()<br /> <br /> Starting with commit dd26c1a23fd5 ("PCI: rcar-host: Switch to<br /> msi_create_parent_irq_domain()"), the MSI parent IRQ domain is NULL because<br /> the object of type struct irq_domain_info passed to:<br /> <br /> msi_create_parent_irq_domain() -&gt;<br /> irq_domain_instantiate()() -&gt;<br /> __irq_domain_instantiate()<br /> <br /> has no reference to the parent IRQ domain. Using msi-&gt;domain-&gt;parent as an<br /> argument for generic_handle_domain_irq() leads to below error:<br /> <br /> "Unable to handle kernel NULL pointer dereference at virtual address"<br /> <br /> This error was identified while switching the upcoming RZ/G3S PCIe host<br /> controller driver to msi_create_parent_irq_domain() (which was using a<br /> similar pattern to handle MSIs (see link section)), but it was not tested<br /> on hardware using the pcie-rcar-host controller driver due to lack of<br /> hardware.<br /> <br /> [mani: reworded subject and description]
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025