Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-71151

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: Fix memory and information leak in smb3_reconfigure()<br /> <br /> In smb3_reconfigure(), if smb3_sync_session_ctx_passwords() fails, the<br /> function returns immediately without freeing and erasing the newly<br /> allocated new_password and new_password2. This causes both a memory leak<br /> and a potential information leak.<br /> <br /> Fix this by calling kfree_sensitive() on both password buffers before<br /> returning in this error case.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-13921

Publication date:
23/01/2026
The weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki &amp; AI Chatbot plugin for WordPress is vulnerable to unauthorized modification or loss of data due to a missing capability check on the &amp;#39;wedocs_user_documentation_handling_capabilities&amp;#39; function in all versions up to, and including, 2.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit any documentation post. The vulnerability was partially patched in version 2.1.16.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-71145

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: phy: isp1301: fix non-OF device reference imbalance<br /> <br /> A recent change fixing a device reference leak in a UDC driver<br /> introduced a potential use-after-free in the non-OF case as the<br /> isp1301_get_client() helper only increases the reference count for the<br /> returned I2C device in the OF case.<br /> <br /> Increment the reference count also for non-OF so that the caller can<br /> decrement it unconditionally.<br /> <br /> Note that this is inherently racy just as using the returned I2C device<br /> is since nothing is preventing the PHY driver from being unbound while<br /> in use.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-4320

Publication date:
23/01/2026
Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2026-0914

Publication date:
23/01/2026
The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s &amp;#39;lw_content_block&amp;#39; shortcode in all versions up to, and including, 3.1.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-4319

Publication date:
23/01/2026
Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Brute Force, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-14866

Publication date:
23/01/2026
The Melapress Role Editor plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.1. This is due to a misconfigured capability check on the &amp;#39;save_secondary_roles_field&amp;#39; function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to assign themselves additional roles including Administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-2204

Publication date:
23/01/2026
Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Tapandsign Technologies Software Inc. Tap&amp;Sign allows Cross-Site Scripting (XSS).This issue affects Tap&amp;Sign: through 23012026.<br /> <br /> NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2026-22273

Publication date:
23/01/2026
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains an Use of Default Credentials vulnerability in the OS. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2026-22274

Publication date:
23/01/2026
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability in the Fabric Syslog. An unauthenticated attacker with remote access could potentially exploit this vulnerability to intercept and modify information in transit.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2026-22275

Publication date:
23/01/2026
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains an Inclusion of Sensitive Information in Source Code vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2026-22276

Publication date:
23/01/2026
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Storage of Sensitive Information vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026