Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-60569

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetRoute.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-43994

Publication date:
24/10/2025
Dell Storage Center - Dell Storage Manager, version(s) DSM 20.1.21, contain(s) a Missing Authentication for Critical Function vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-43995

Publication date:
24/10/2025
Dell Storage Center - Dell Storage Manager, version(s) 20.1.21, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Authentication Bypass in DSM Data Collector. An unauthenticated remote attacker can access APIs exposed by ApiProxy.war in DataCollectorEar.ear by using a special SessionKey and UserId. These userid are special users created in compellentservicesapi for special purposes.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-11145

Publication date:
24/10/2025
Observable Discrepancy, Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. EnVision allows Account Footprinting.This issue affects enVision: before 250566.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-46425

Publication date:
24/10/2025
Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-46185

Publication date:
24/10/2025
An Insecure Permission vulnerability in pgcodekeeper 10.12.0 allows a local attacker to obtain sensitive information via the plaintext storage of passwords and usernames.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-46183

Publication date:
24/10/2025
The Utils.deserialize function in pgCodeKeeper 10.12.0 processes serialized data from untrusted sources. If an attacker provides a specially crafted .ser file, deserialization may result in unintended code execution or other malicious behavior on the target system.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2021-43768

Publication date:
24/10/2025
In Malwarebytes For Teams v.1.0.990 and before and fixed in v.1.0.1003 and later a privilege escalation can occur via the COM interface running in mbamservice.exe.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-40020

Publication date:
24/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: peak_usb: fix shift-out-of-bounds issue<br /> <br /> Explicitly uses a 64-bit constant when the number of bits used for its<br /> shifting is 32 (which is the case for PC CAN FD interfaces supported by<br /> this driver).<br /> <br /> [mkl: update subject, apply manually]
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-40021

Publication date:
24/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tracing: dynevent: Add a missing lockdown check on dynevent<br /> <br /> Since dynamic_events interface on tracefs is compatible with<br /> kprobe_events and uprobe_events, it should also check the lockdown<br /> status and reject if it is set.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-40022

Publication date:
24/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> crypto: af_alg - Fix incorrect boolean values in af_alg_ctx<br /> <br /> Commit 1b34cbbf4f01 ("crypto: af_alg - Disallow concurrent writes in<br /> af_alg_sendmsg") changed some fields from bool to 1-bit bitfields of<br /> type u32.<br /> <br /> However, some assignments to these fields, specifically &amp;#39;more&amp;#39; and<br /> &amp;#39;merge&amp;#39;, assign values greater than 1. These relied on C&amp;#39;s implicit<br /> conversion to bool, such that zero becomes false and nonzero becomes<br /> true.<br /> <br /> With a 1-bit bitfields of type u32 instead, mod 2 of the value is taken<br /> instead, resulting in 0 being assigned in some cases when 1 was intended.<br /> <br /> Fix this by restoring the bool type.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-40023

Publication date:
24/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/xe/vf: Don&amp;#39;t expose sysfs attributes not applicable for VFs<br /> <br /> VFs can&amp;#39;t read BMG_PCIE_CAP(0x138340) register nor access PCODE<br /> (already guarded by the info.skip_pcode flag) so we shouldn&amp;#39;t<br /> expose attributes that require any of them to avoid errors like:<br /> <br /> [] xe 0000:03:00.1: [drm] Tile0: GT0: VF is trying to read an \<br /> inaccessible register 0x138340+0x0<br /> [] RIP: 0010:xe_gt_sriov_vf_read32+0x6c2/0x9a0 [xe]<br /> [] Call Trace:<br /> [] xe_mmio_read32+0x110/0x280 [xe]<br /> [] auto_link_downgrade_capable_show+0x2e/0x70 [xe]<br /> [] dev_attr_show+0x1a/0x70<br /> [] sysfs_kf_seq_show+0xaa/0x120<br /> [] kernfs_seq_show+0x41/0x60<br /> <br /> (cherry picked from commit a2d6223d224f333f705ed8495bf8bebfbc585c35)
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025