Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-21053

Publication date:
10/10/2025
Out-of-bounds write in the parsing header for JPEG decoding in libpadm.so prior to SMR Oct-2025 Release 1 allows local attackers to cause memory corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2025-21046

Publication date:
10/10/2025
Improper access control in WindowManager in Samsung DeX prior to SMR Oct-2025 Release 1 allows physical attackers to temporarily access to recent app list.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2025-21047

Publication date:
10/10/2025
Improper access control in KnoxGuard prior to SMR Oct-2025 Release 1 allows physical attackers to use the privileged APIs.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2025-21045

Publication date:
10/10/2025
Insecure storage of sensitive information in Galaxy Watch prior to SMR Oct-2025 Release 1 allows local attackers to access sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2025-21044

Publication date:
10/10/2025
Out-of-bounds write in fingerprint trustlet prior to SMR Oct-2025 Release 1 allows local privileged attackers to write out-of-bounds memory.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2025-10124

Publication date:
10/10/2025
The Booking Manager WordPress plugin before 2.1.15 registers a shortcode that deletes bookings and makes that shortcode available to anyone with contributor and above privileges. When a page containing the shortcode is visited, the bookings are deleted.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-11570

Publication date:
10/10/2025
Versions of the package drupal-pattern-lab/unified-twig-extensions from 0.0.0 are vulnerable to Cross-site Scripting (XSS) due to insufficient filtering of data.<br /> <br /> **Note:**<br /> This is exploitable only if the code is executed outside of Drupal; the function is intended to be shared between Drupal and Pattern Lab.<br /> <br /> The package drupal-pattern-lab/unified-twig-extensions is unmaintained, the fix for this issue exists in version 1.1.1 of [drupal/unified_twig_ext](https://www.drupal.org/project/unified_twig_ext)
Severity CVSS v4.0: MEDIUM
Last modification:
14/10/2025

CVE-2025-61871

Publication date:
10/10/2025
NAS Navigator2 Windows version by BUFFALO INC. registers a Windows service with an unquoted file path. A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM privilege.
Severity CVSS v4.0: HIGH
Last modification:
14/10/2025

CVE-2025-11569

Publication date:
10/10/2025
Rejected reason: This record was withdrawn by its CNA; further investigation revealed it was not a security issue.
Severity CVSS v4.0: HIGH
Last modification:
30/10/2025

CVE-2025-11449

Publication date:
10/10/2025
ServiceNow has addressed a reflected cross-site scripting vulnerability that was identified in the ServiceNow AI Platform. This vulnerability could result in arbitrary code being executed within the browsers of ServiceNow users who click on a specially crafted link.   <br /> <br /> <br /> <br /> <br /> <br /> ServiceNow has addressed this vulnerability by deploying a relevant security update to the majority of hosted instances. Relevant security updates also have been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configuration. Further, the vulnerability is addressed in the listed patches and hot fixes. We recommend customers promptly apply appropriate updates or upgrade if they have not already done so.
Severity CVSS v4.0: MEDIUM
Last modification:
14/10/2025

CVE-2025-11450

Publication date:
10/10/2025
ServiceNow has addressed a reflected cross-site scripting vulnerability that was identified in the ServiceNow AI Platform. This vulnerability could result in arbitrary code being executed within the browsers of ServiceNow users who click on a specially crafted link. <br /> <br /> ServiceNow has addressed this vulnerability by deploying a relevant security update to the majority of hosted instances. Relevant security updates also have been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Further, the vulnerability is addressed in the listed patches and hot fixes. We recommend customers promptly apply appropriate updates or upgrade if they have not already done so.
Severity CVSS v4.0: MEDIUM
Last modification:
14/10/2025

CVE-2025-61926

Publication date:
09/10/2025
Allstar is a GitHub App to set and enforce security policies. In versions prior to 4.5, a vulnerability in Allstar’s Reviewbot component caused inbound webhook requests to be validated against a hard-coded, shared secret. The value used for the secret token was compiled into the Allstar binary and could not be configured at runtime. In practice, this meant that every deployment using Reviewbot would validate requests with the same secret unless the operator modified source code and rebuilt the component - an expectation that is not documented and is easy to miss. All Allstar releases prior to v4.5 that include the Reviewbot code path are affected. Deployments on v4.5 and later are not affected. Those who have not enabled or exposed the Reviewbot endpoint are not exposed to this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025