Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-68756

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set-&gt;tag_list_lock<br /> <br /> blk_mq_{add,del}_queue_tag_set() functions add and remove queues from<br /> tagset, the functions make sure that tagset and queues are marked as<br /> shared when two or more queues are attached to the same tagset.<br /> Initially a tagset starts as unshared and when the number of added<br /> queues reaches two, blk_mq_add_queue_tag_set() marks it as shared along<br /> with all the queues attached to it. When the number of attached queues<br /> drops to 1 blk_mq_del_queue_tag_set() need to mark both the tagset and<br /> the remaining queues as unshared.<br /> <br /> Both functions need to freeze current queues in tagset before setting on<br /> unsetting BLK_MQ_F_TAG_QUEUE_SHARED flag. While doing so, both functions<br /> hold set-&gt;tag_list_lock mutex, which makes sense as we do not want<br /> queues to be added or deleted in the process. This used to work fine<br /> until commit 98d81f0df70c ("nvme: use blk_mq_[un]quiesce_tagset")<br /> made the nvme driver quiesce tagset instead of quiscing individual<br /> queues. blk_mq_quiesce_tagset() does the job and quiesce the queues in<br /> set-&gt;tag_list while holding set-&gt;tag_list_lock also.<br /> <br /> This results in deadlock between two threads with these stacktraces:<br /> <br /> __schedule+0x47c/0xbb0<br /> ? timerqueue_add+0x66/0xb0<br /> schedule+0x1c/0xa0<br /> schedule_preempt_disabled+0xa/0x10<br /> __mutex_lock.constprop.0+0x271/0x600<br /> blk_mq_quiesce_tagset+0x25/0xc0<br /> nvme_dev_disable+0x9c/0x250<br /> nvme_timeout+0x1fc/0x520<br /> blk_mq_handle_expired+0x5c/0x90<br /> bt_iter+0x7e/0x90<br /> blk_mq_queue_tag_busy_iter+0x27e/0x550<br /> ? __blk_mq_complete_request_remote+0x10/0x10<br /> ? __blk_mq_complete_request_remote+0x10/0x10<br /> ? __call_rcu_common.constprop.0+0x1c0/0x210<br /> blk_mq_timeout_work+0x12d/0x170<br /> process_one_work+0x12e/0x2d0<br /> worker_thread+0x288/0x3a0<br /> ? rescuer_thread+0x480/0x480<br /> kthread+0xb8/0xe0<br /> ? kthread_park+0x80/0x80<br /> ret_from_fork+0x2d/0x50<br /> ? kthread_park+0x80/0x80<br /> ret_from_fork_asm+0x11/0x20<br /> <br /> __schedule+0x47c/0xbb0<br /> ? xas_find+0x161/0x1a0<br /> schedule+0x1c/0xa0<br /> blk_mq_freeze_queue_wait+0x3d/0x70<br /> ? destroy_sched_domains_rcu+0x30/0x30<br /> blk_mq_update_tag_set_shared+0x44/0x80<br /> blk_mq_exit_queue+0x141/0x150<br /> del_gendisk+0x25a/0x2d0<br /> nvme_ns_remove+0xc9/0x170<br /> nvme_remove_namespaces+0xc7/0x100<br /> nvme_remove+0x62/0x150<br /> pci_device_remove+0x23/0x60<br /> device_release_driver_internal+0x159/0x200<br /> unbind_store+0x99/0xa0<br /> kernfs_fop_write_iter+0x112/0x1e0<br /> vfs_write+0x2b1/0x3d0<br /> ksys_write+0x4e/0xb0<br /> do_syscall_64+0x5b/0x160<br /> entry_SYSCALL_64_after_hwframe+0x4b/0x53<br /> <br /> The top stacktrace is showing nvme_timeout() called to handle nvme<br /> command timeout. timeout handler is trying to disable the controller and<br /> as a first step, it needs to blk_mq_quiesce_tagset() to tell blk-mq not<br /> to call queue callback handlers. The thread is stuck waiting for<br /> set-&gt;tag_list_lock as it tries to walk the queues in set-&gt;tag_list.<br /> <br /> The lock is held by the second thread in the bottom stack which is<br /> waiting for one of queues to be frozen. The queue usage counter will<br /> drop to zero after nvme_timeout() finishes, and this will not happen<br /> because the thread will wait for this mutex forever.<br /> <br /> Given that [un]quiescing queue is an operation that does not need to<br /> sleep, update blk_mq_[un]quiesce_tagset() to use RCU instead of taking<br /> set-&gt;tag_list_lock, update blk_mq_{add,del}_queue_tag_set() to use RCU<br /> safe list operations. Also, delete INIT_LIST_HEAD(&amp;q-&gt;tag_set_list)<br /> in blk_mq_del_queue_tag_set() because we can not re-initialize it while<br /> the list is being traversed under RCU. The deleted queue will not be<br /> added/deleted to/from a tagset and it will be freed in blk_free_queue()<br /> after the end of RCU grace period.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68757

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/vgem-fence: Fix potential deadlock on release<br /> <br /> A timer that expires a vgem fence automatically in 10 seconds is now<br /> released with timer_delete_sync() from fence-&gt;ops.release() called on last<br /> dma_fence_put(). In some scenarios, it can run in IRQ context, which is<br /> not safe unless TIMER_IRQSAFE is used. One potentially risky scenario was<br /> demonstrated in Intel DRM CI trybot, BAT run on machine bat-adlp-6, while<br /> working on new IGT subtests syncobj_timeline@stress-* as user space<br /> replacements of some problematic test cases of a dma-fence-chain selftest<br /> [1].<br /> <br /> [117.004338] ================================<br /> [117.004340] WARNING: inconsistent lock state<br /> [117.004342] 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 Tainted: G S U<br /> [117.004346] --------------------------------<br /> [117.004347] inconsistent {HARDIRQ-ON-W} -&gt; {IN-HARDIRQ-W} usage.<br /> [117.004349] swapper/0/0 [HC1[1]:SC1[1]:HE0:SE0] takes:<br /> [117.004352] ffff888138f86aa8 ((&amp;fence-&gt;timer)){?.-.}-{0:0}, at: __timer_delete_sync+0x4b/0x190<br /> [117.004361] {HARDIRQ-ON-W} state was registered at:<br /> [117.004363] lock_acquire+0xc4/0x2e0<br /> [117.004366] call_timer_fn+0x80/0x2a0<br /> [117.004368] __run_timers+0x231/0x310<br /> [117.004370] run_timer_softirq+0x76/0xe0<br /> [117.004372] handle_softirqs+0xd4/0x4d0<br /> [117.004375] __irq_exit_rcu+0x13f/0x160<br /> [117.004377] irq_exit_rcu+0xe/0x20<br /> [117.004379] sysvec_apic_timer_interrupt+0xa0/0xc0<br /> [117.004382] asm_sysvec_apic_timer_interrupt+0x1b/0x20<br /> [117.004385] cpuidle_enter_state+0x12b/0x8a0<br /> [117.004388] cpuidle_enter+0x2e/0x50<br /> [117.004393] call_cpuidle+0x22/0x60<br /> [117.004395] do_idle+0x1fd/0x260<br /> [117.004398] cpu_startup_entry+0x29/0x30<br /> [117.004401] start_secondary+0x12d/0x160<br /> [117.004404] common_startup_64+0x13e/0x141<br /> [117.004407] irq event stamp: 2282669<br /> [117.004409] hardirqs last enabled at (2282668): [] _raw_spin_unlock_irqrestore+0x51/0x80<br /> [117.004414] hardirqs last disabled at (2282669): [] sysvec_irq_work+0x11/0xc0<br /> [117.004419] softirqs last enabled at (2254702): [] __do_softirq+0x10/0x18<br /> [117.004423] softirqs last disabled at (2254725): [] __irq_exit_rcu+0x13f/0x160<br /> [117.004426]<br /> other info that might help us debug this:<br /> [117.004429] Possible unsafe locking scenario:<br /> [117.004432] CPU0<br /> [117.004433] ----<br /> [117.004434] lock((&amp;fence-&gt;timer));<br /> [117.004436] <br /> [117.004438] lock((&amp;fence-&gt;timer));<br /> [117.004440]<br /> *** DEADLOCK ***<br /> [117.004443] 1 lock held by swapper/0/0:<br /> [117.004445] #0: ffffc90000003d50 ((&amp;fence-&gt;timer)){?.-.}-{0:0}, at: call_timer_fn+0x7a/0x2a0<br /> [117.004450]<br /> stack backtrace:<br /> [117.004453] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G S U 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 PREEMPT(voluntary)<br /> [117.004455] Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER<br /> [117.004455] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023<br /> [117.004456] Call Trace:<br /> [117.004456] <br /> [117.004457] dump_stack_lvl+0x91/0xf0<br /> [117.004460] dump_stack+0x10/0x20<br /> [117.004461] print_usage_bug.part.0+0x260/0x360<br /> [117.004463] mark_lock+0x76e/0x9c0<br /> [117.004465] ? register_lock_class+0x48/0x4a0<br /> [117.004467] __lock_acquire+0xbc3/0x2860<br /> [117.004469] lock_acquire+0xc4/0x2e0<br /> [117.004470] ? __timer_delete_sync+0x4b/0x190<br /> [117.004472] ? __timer_delete_sync+0x4b/0x190<br /> [117.004473] __timer_delete_sync+0x68/0x190<br /> [117.004474] ? __timer_delete_sync+0x4b/0x190<br /> [117.004475] timer_delete_sync+0x10/0x20<br /> [117.004476] vgem_fence_release+0x19/0x30 [vgem]<br /> [117.004478] dma_fence_release+0xc1/0x3b0<br /> [117.004480] ? dma_fence_release+0xa1/0x3b0<br /> [117.004481] dma_fence_chain_release+0xe7/0x130<br /> [117.004483] dma_fence_release+0xc1/0x3b0<br /> [117.004484] ? _raw_spin_unlock_irqrestore+0x27/0x80<br /> [117.004485] dma_fence_chain_irq_work+0x59/0x80<br /> [117.004487] irq_work_single+0x75/0xa0<br /> [117.004490] irq_work_r<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68758

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> backlight: led-bl: Add devlink to supplier LEDs<br /> <br /> LED Backlight is a consumer of one or multiple LED class devices, but<br /> devlink is currently unable to create correct supplier-producer links when<br /> the supplier is a class device. It creates instead a link where the<br /> supplier is the parent of the expected device.<br /> <br /> One consequence is that removal order is not correctly enforced.<br /> <br /> Issues happen for example with the following sections in a device tree<br /> overlay:<br /> <br /> // An LED driver chip<br /> pca9632@62 {<br /> compatible = "nxp,pca9632";<br /> reg = ;<br /> <br /> // ...<br /> <br /> addon_led_pwm: led-pwm@3 {<br /> reg = ;<br /> label = "addon:led:pwm";<br /> };<br /> };<br /> <br /> backlight-addon {<br /> compatible = "led-backlight";<br /> leds = ;<br /> brightness-levels = ;<br /> default-brightness-level = ;<br /> };<br /> <br /> In this example, the devlink should be created between the backlight-addon<br /> (consumer) and the pca9632@62 (supplier). Instead it is created between the<br /> backlight-addon (consumer) and the parent of the pca9632@62, which is<br /> typically the I2C bus adapter.<br /> <br /> On removal of the above overlay, the LED driver can be removed before the<br /> backlight device, resulting in:<br /> <br /> Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010<br /> ...<br /> Call trace:<br /> led_put+0xe0/0x140<br /> devm_led_release+0x6c/0x98<br /> <br /> Another way to reproduce the bug without any device tree overlays is<br /> unbinding the LED class device (pca9632@62) before unbinding the consumer<br /> (backlight-addon):<br /> <br /> echo 11-0062 &gt;/sys/bus/i2c/drivers/leds-pca963x/unbind<br /> echo ...backlight-dock &gt;/sys/bus/platform/drivers/led-backlight/unbind<br /> <br /> Fix by adding a devlink between the consuming led-backlight device and the<br /> supplying LED device, as other drivers and subsystems do as well.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-5965

Publication date:
05/01/2026
In the backup parameters, a user with high privilege is able to concatenate custom instructions to the backup setup. Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS Command Injection&amp;#39;) vulnerability in Centreon Infra Monitoring (Backup configuration in the administration setup modules) allows OS Command Injection.This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2026-0582

Publication date:
05/01/2026
A vulnerability was identified in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/edit_activity_query.php. The manipulation of the argument Title leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Severity CVSS v4.0: MEDIUM
Last modification:
22/01/2026

CVE-2025-15239

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.
Severity CVSS v4.0: HIGH
Last modification:
20/01/2026

CVE-2025-15240

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Severity CVSS v4.0: HIGH
Last modification:
20/01/2026

CVE-2025-66518

Publication date:
05/01/2026
Any client who can access to Apache Kyuubi Server via Kyuubi frontend protocols can bypass server-side config kyuubi.session.local.dir.allow.list and use local files which are not listed in the config.<br /> <br /> This issue affects Apache Kyuubi: from 1.6.0 through 1.10.2.<br /> <br /> Users are recommended to upgrade to version 1.10.3 or upper, which fixes the issue.
Severity CVSS v4.0: HIGH
Last modification:
27/01/2026

CVE-2026-0581

Publication date:
05/01/2026
A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this issue is the function formBehaviorManager of the file /goform/BehaviorManager of the component httpd. Executing a manipulation of the argument modulename/option/data/switch can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Severity CVSS v4.0: MEDIUM
Last modification:
12/01/2026

CVE-2026-0580

Publication date:
05/01/2026
A vulnerability was found in SourceCodester API Key Manager App 1.0. Affected by this vulnerability is an unknown functionality of the component Import Key Handler. Performing a manipulation results in cross site scripting. The attack can be initiated remotely.
Severity CVSS v4.0: MEDIUM
Last modification:
22/01/2026

CVE-2025-15238

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.
Severity CVSS v4.0: HIGH
Last modification:
20/01/2026

CVE-2025-15235

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Missing Authorization vulnerability, allowing authenticated remote attackers to modify specific network packet parameters, enabling certain system functions to access other users&amp;#39; files.
Severity CVSS v4.0: HIGH
Last modification:
20/01/2026