Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-12519

Publication date:
05/01/2026
Missing Authorization vulnerability in Centreon Infra Monitoring (Administration parameters API endpoint modules) allows Accessing Functionality Not Properly Constrained by ACLs, resulting in Information Disclosure like downtime or acknowledgement configurations. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2026-0583

Publication date:
05/01/2026
A security flaw has been discovered in code-projects Online Product Reservation System 1.0. This vulnerability affects unknown code of the file app/user/login.php of the component User Login. The manipulation of the argument emailadd results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Severity CVSS v4.0: MEDIUM
Last modification:
29/04/2026

CVE-2026-0584

Publication date:
05/01/2026
A weakness has been identified in code-projects Online Product Reservation System 1.0. This issue affects some unknown processing of the file app/products/left_cart.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2026-0585

Publication date:
05/01/2026
A security vulnerability has been detected in code-projects Online Product Reservation System 1.0. Impacted is an unknown function of the file /order_view.php of the component GET Parameter Handler. Such manipulation of the argument transaction_id leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
29/04/2026

CVE-2025-68759

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()<br /> <br /> In rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA<br /> allocations in a loop. When an allocation fails, the previously<br /> successful allocations are not freed on exit.<br /> <br /> Fix that by jumping to err_free_rings label on error, which calls<br /> rtl8180_free_rx_ring() to free the allocations. Remove the free of<br /> rx_ring in rtl8180_init_rx_ring() error path, and set the freed<br /> priv-&gt;rx_buf entry to null, to avoid double free.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68760

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show<br /> <br /> In iommu_mmio_write(), it validates the user-provided offset with the<br /> check: `iommu-&gt;dbg_mmio_offset &gt; iommu-&gt;mmio_phys_end - 4`.<br /> This assumes a 4-byte access. However, the corresponding<br /> show handler, iommu_mmio_show(), uses readq() to perform an 8-byte<br /> (64-bit) read.<br /> <br /> If a user provides an offset equal to `mmio_phys_end - 4`, the check<br /> passes, and will lead to a 4-byte out-of-bounds read.<br /> <br /> Fix this by adjusting the boundary check to use sizeof(u64), which<br /> corresponds to the size of the readq() operation.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68761

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> hfs: fix potential use after free in hfs_correct_next_unused_CNID()<br /> <br /> This code calls hfs_bnode_put(node) which drops the refcount and then<br /> dreferences "node" on the next line. It&amp;#39;s only safe to use "node"<br /> when we&amp;#39;re holding a reference so flip these two lines around.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68762

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: netpoll: initialize work queue before error checks<br /> <br /> Prevent a kernel warning when netconsole setup fails on devices with<br /> IFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in<br /> __flush_work) occurs because the cleanup path tries to cancel an<br /> uninitialized work queue.<br /> <br /> When __netpoll_setup() encounters a device with IFF_DISABLE_NETPOLL,<br /> it fails early and calls skb_pool_flush() for cleanup. This function<br /> calls cancel_work_sync(&amp;np-&gt;refill_wq), but refill_wq hasn&amp;#39;t been<br /> initialized yet, triggering the warning.<br /> <br /> Move INIT_WORK() to the beginning of __netpoll_setup(), ensuring the<br /> work queue is properly initialized before any potential failure points.<br /> This allows the cleanup path to safely cancel the work queue regardless<br /> of where the setup fails.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68763

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> crypto: starfive - Correctly handle return of sg_nents_for_len<br /> <br /> The return value of sg_nents_for_len was assigned to an unsigned long<br /> in starfive_hash_digest, causing negative error codes to be converted<br /> to large positive integers.<br /> <br /> Add error checking for sg_nents_for_len and return immediately on<br /> failure to prevent potential buffer overflows.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68764

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags<br /> <br /> When a filesystem is being automounted, it needs to preserve the<br /> user-set superblock mount options, such as the "ro" flag.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68765

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()<br /> <br /> In mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the<br /> subsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function<br /> returns an error without freeing sskb, leading to a memory leak.<br /> <br /> Fix this by calling dev_kfree_skb() on sskb in the error handling path<br /> to ensure it is properly released.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-68766

Publication date:
05/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()<br /> <br /> If irq_domain_translate_twocell() sets "hwirq" to &gt;= MCHP_EIC_NIRQ (2) then<br /> it results in an out of bounds access.<br /> <br /> The code checks for invalid values, but doesn&amp;#39;t set the error code. Return<br /> -EINVAL in that case, instead of returning success.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026