Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-11367

Publication date:
12/11/2025
The N-central Software Probe
Severity CVSS v4.0: CRITICAL
Last modification:
12/11/2025

CVE-2025-11700

Publication date:
12/11/2025
N-central versions
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-63667

Publication date:
12/11/2025
Incorrect access control in SIMICAM v1.16.41-20250725, KEVIEW v1.14.92-20241120, ASECAM v1.14.10-20240725 allows attackers to access sensitive API endpoints without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-63666

Publication date:
12/11/2025
Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-11566

Publication date:
12/11/2025
CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker on the local network to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on the /REST/shutdownnow endpoint.
Severity CVSS v4.0: MEDIUM
Last modification:
12/11/2025

CVE-2025-11567

Publication date:
12/11/2025
CWE-276: Incorrect Default Permissions vulnerability exists that could cause elevated system access when the target installation folder is not properly secured.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-11565

Publication date:
12/11/2025
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST /REST/UpdateJRE request payload.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-62876

Publication date:
12/11/2025
A Execution with Unnecessary Privileges vulnerability in lightdm-kde-greeter allows escalation from the service user to root.This issue affects lightdm-kde-greeter. before 6.0.4.
Severity CVSS v4.0: MEDIUM
Last modification:
12/11/2025

CVE-2025-12998

Publication date:
12/11/2025
Improper Authentication vulnerability in TYPO3 Extension "Modules" codingms/modules.This issue affects Extension "Modules": before 4.3.11, from 5.0.0 before 5.7.4, from 6.0.0 before 6.4.2, from 7.0.0 before 7.5.5.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-40175

Publication date:
12/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> idpf: cleanup remaining SKBs in PTP flows<br /> <br /> When the driver requests Tx timestamp value, one of the first steps is<br /> to clone SKB using skb_get. It increases the reference counter for that<br /> SKB to prevent unexpected freeing by another component.<br /> However, there may be a case where the index is requested, SKB is<br /> assigned and never consumed by PTP flows - for example due to reset during<br /> running PTP apps.<br /> <br /> Add a check in release timestamping function to verify if the SKB<br /> assigned to Tx timestamp latch was freed, and release remaining SKBs.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-40176

Publication date:
12/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: wait for pending async decryptions if tls_strp_msg_hold fails<br /> <br /> Async decryption calls tls_strp_msg_hold to create a clone of the<br /> input skb to hold references to the memory it uses. If we fail to<br /> allocate that clone, proceeding with async decryption can lead to<br /> various issues (UAF on the skb, writing into userspace memory after<br /> the recv() call has returned).<br /> <br /> In this case, wait for all pending decryption requests.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-40177

Publication date:
12/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> accel/qaic: Fix bootlog initialization ordering<br /> <br /> As soon as we queue MHI buffers to receive the bootlog from the device,<br /> we could be receiving data. Therefore all the resources needed to<br /> process that data need to be setup prior to queuing the buffers.<br /> <br /> We currently initialize some of the resources after queuing the buffers<br /> which creates a race between the probe() and any data that comes back<br /> from the device. If the uninitialized resources are accessed, we could<br /> see page faults.<br /> <br /> Fix the init ordering to close the race.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025