Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-40331

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sctp: Prevent TOCTOU out-of-bounds write<br /> <br /> For the following path not holding the sock lock,<br /> <br /> sctp_diag_dump() -&gt; sctp_for_each_endpoint() -&gt; sctp_ep_dump()<br /> <br /> make sure not to exceed bounds in case the address list has grown<br /> between buffer allocation (time-of-check) and write (time-of-use).
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40332

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdkfd: Fix mmap write lock not release<br /> <br /> If mmap write lock is taken while draining retry fault, mmap write lock<br /> is not released because svm_range_restore_pages calls mmap_read_unlock<br /> then returns. This causes deadlock and system hangs later because mmap<br /> read or write lock cannot be taken.<br /> <br /> Downgrade mmap write lock to read lock if draining retry fault fix this<br /> bug.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40333

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix infinite loop in __insert_extent_tree()<br /> <br /> When we get wrong extent info data, and look up extent_node in rb tree,<br /> it will cause infinite loop (CONFIG_F2FS_CHECK_FS=n). Avoiding this by<br /> return NULL and print some kernel messages in that case.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40334

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: validate userq buffer virtual address and size<br /> <br /> It needs to validate the userq object virtual address to<br /> determine whether it is residented in a valid vm mapping.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40335

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: validate userq input args<br /> <br /> This will help on validating the userq input args, and<br /> rejecting for the invalid userq request at the IOCTLs<br /> first place.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40336

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/gpusvm: fix hmm_pfn_to_map_order() usage<br /> <br /> Handle the case where the hmm range partially covers a huge page (like<br /> 2M), otherwise we can potentially end up doing something nasty like<br /> mapping memory which is outside the range, and maybe not even mapped by<br /> the mm. Fix is based on the xe userptr code, which in a future patch<br /> will directly use gpusvm, so needs alignment here.<br /> <br /> v2:<br /> - Add kernel-doc (Matt B)<br /> - s/fls/ilog2/ (Thomas)
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40337

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: stmmac: Correctly handle Rx checksum offload errors<br /> <br /> The stmmac_rx function would previously set skb-&gt;ip_summed to<br /> CHECKSUM_UNNECESSARY if hardware checksum offload (CoE) was enabled<br /> and the packet was of a known IP ethertype.<br /> <br /> However, this logic failed to check if the hardware had actually<br /> reported a checksum error. The hardware status, indicating a header or<br /> payload checksum failure, was being ignored at this stage. This could<br /> cause corrupt packets to be passed up the network stack as valid.<br /> <br /> This patch corrects the logic by checking the `csum_none` status flag,<br /> which is set when the hardware reports a checksum error. If this flag<br /> is set, skb-&gt;ip_summed is now correctly set to CHECKSUM_NONE,<br /> ensuring the kernel&amp;#39;s network stack will perform its own validation and<br /> properly handle the corrupt packet.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40327

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> perf/core: Fix system hang caused by cpu-clock usage<br /> <br /> cpu-clock usage by the async-profiler tool can trigger a system hang,<br /> which got bisected back to the following commit by Octavia Togami:<br /> <br /> 18dbcbfabfff ("perf: Fix the POLL_HUP delivery breakage") causes this issue<br /> <br /> The root cause of the hang is that cpu-clock is a special type of SW<br /> event which relies on hrtimers. The __perf_event_overflow() callback<br /> is invoked from the hrtimer handler for cpu-clock events, and<br /> __perf_event_overflow() tries to call cpu_clock_event_stop()<br /> to stop the event, which calls htimer_cancel() to cancel the hrtimer.<br /> <br /> But that&amp;#39;s a recursion into the hrtimer code from a hrtimer handler,<br /> which (unsurprisingly) deadlocks.<br /> <br /> To fix this bug, use hrtimer_try_to_cancel() instead, and set<br /> the PERF_HES_STOPPED flag, which causes perf_swevent_hrtimer()<br /> to stop the event once it sees the PERF_HES_STOPPED flag.<br /> <br /> [ mingo: Fixed the comments and improved the changelog. ]
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-40328

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> smb: client: fix potential UAF in smb2_close_cached_fid()<br /> <br /> find_or_create_cached_dir() could grab a new reference after kref_put()<br /> had seen the refcount drop to zero but before cfid_list_lock is acquired<br /> in smb2_close_cached_fid(), leading to use-after-free.<br /> <br /> Switch to kref_put_lock() so cfid_release() is called with<br /> cfid_list_lock held, closing that gap.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2025-2296

Publication date:
09/12/2025
EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.
Severity CVSS v4.0: HIGH
Last modification:
09/12/2025

CVE-2025-14345

Publication date:
09/12/2025
A post-authentication flaw in the network two-phase commit protocol used for cross-shard transactions in MongoDB Server may lead to logical data inconsistencies under specific conditions which are not predictable and exist for a very short period of time. This error can cause the transaction coordination logic to misinterpret the transaction as committed, resulting in inconsistent state on those shards. This may lead to low integrity and availability impact.<br /> <br /> This issue impacts MongoDB Server v8.0 versions prior to 8.0.16, MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB server v8.2 versions prior to 8.2.2.
Severity CVSS v4.0: LOW
Last modification:
11/12/2025

CVE-2025-14325

Publication date:
09/12/2025
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2026