Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-38010

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking<br /> <br /> The current implementation uses bias_pad_enable as a reference count to<br /> manage the shared bias pad for all UTMI PHYs. However, during system<br /> suspension with connected USB devices, multiple power-down requests for<br /> the UTMI pad result in a mismatch in the reference count, which in turn<br /> produces warnings such as:<br /> <br /> [ 237.762967] WARNING: CPU: 10 PID: 1618 at tegra186_utmi_pad_power_down+0x160/0x170<br /> [ 237.763103] Call trace:<br /> [ 237.763104] tegra186_utmi_pad_power_down+0x160/0x170<br /> [ 237.763107] tegra186_utmi_phy_power_off+0x10/0x30<br /> [ 237.763110] phy_power_off+0x48/0x100<br /> [ 237.763113] tegra_xusb_enter_elpg+0x204/0x500<br /> [ 237.763119] tegra_xusb_suspend+0x48/0x140<br /> [ 237.763122] platform_pm_suspend+0x2c/0xb0<br /> [ 237.763125] dpm_run_callback.isra.0+0x20/0xa0<br /> [ 237.763127] __device_suspend+0x118/0x330<br /> [ 237.763129] dpm_suspend+0x10c/0x1f0<br /> [ 237.763130] dpm_suspend_start+0x88/0xb0<br /> [ 237.763132] suspend_devices_and_enter+0x120/0x500<br /> [ 237.763135] pm_suspend+0x1ec/0x270<br /> <br /> The root cause was traced back to the dynamic power-down changes<br /> introduced in commit a30951d31b25 ("xhci: tegra: USB2 pad power controls"),<br /> where the UTMI pad was being powered down without verifying its current<br /> state. This unbalanced behavior led to discrepancies in the reference<br /> count.<br /> <br /> To rectify this issue, this patch replaces the single reference counter<br /> with a bitmask, renamed to utmi_pad_enabled. Each bit in the mask<br /> corresponds to one of the four USB2 PHYs, allowing us to track each pad&amp;#39;s<br /> enablement status individually.<br /> <br /> With this change:<br /> - The bias pad is powered on only when the mask is clear.<br /> - Each UTMI pad is powered on or down based on its corresponding bit<br /> in the mask, preventing redundant operations.<br /> - The overall power state of the shared bias pad is maintained<br /> correctly during suspend/resume cycles.<br /> <br /> The mutex used to prevent race conditions during UTMI pad enable/disable<br /> operations has been moved from the tegra186_utmi_bias_pad_power_on/off<br /> functions to the parent functions tegra186_utmi_pad_power_on/down. This<br /> change ensures that there are no race conditions when updating the bitmask.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-38011

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: csa unmap use uninterruptible lock<br /> <br /> After process exit to unmap csa and free GPU vm, if signal is accepted<br /> and then waiting to take vm lock is interrupted and return, it causes<br /> memory leaking and below warning backtrace.<br /> <br /> Change to use uninterruptible wait lock fix the issue.<br /> <br /> WARNING: CPU: 69 PID: 167800 at amd/amdgpu/amdgpu_kms.c:1525<br /> amdgpu_driver_postclose_kms+0x294/0x2a0 [amdgpu]<br /> Call Trace:<br /> <br /> drm_file_free.part.0+0x1da/0x230 [drm]<br /> drm_close_helper.isra.0+0x65/0x70 [drm]<br /> drm_release+0x6a/0x120 [drm]<br /> amdgpu_drm_release+0x51/0x60 [amdgpu]<br /> __fput+0x9f/0x280<br /> ____fput+0xe/0x20<br /> task_work_run+0x67/0xa0<br /> do_exit+0x217/0x3c0<br /> do_group_exit+0x3b/0xb0<br /> get_signal+0x14a/0x8d0<br /> arch_do_signal_or_restart+0xde/0x100<br /> exit_to_user_mode_loop+0xc1/0x1a0<br /> exit_to_user_mode_prepare+0xf4/0x100<br /> syscall_exit_to_user_mode+0x17/0x40<br /> do_syscall_64+0x69/0xc0<br /> <br /> (cherry picked from commit 7dbbfb3c171a6f63b01165958629c9c26abf38ab)
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-38012

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator<br /> <br /> BPF programs may call next() and destroy() on BPF iterators even after new()<br /> returns an error value (e.g. bpf_for_each() macro ignores error returns from<br /> new()). bpf_iter_scx_dsq_new() could leave the iterator in an uninitialized<br /> state after an error return causing bpf_iter_scx_dsq_next() to dereference<br /> garbage data. Make bpf_iter_scx_dsq_new() always clear $kit-&gt;dsq so that<br /> next() and destroy() become noops.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-38013

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request<br /> <br /> Make sure that n_channels is set after allocating the<br /> struct cfg80211_registered_device::int_scan_req member. Seen with<br /> syzkaller:<br /> <br /> UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:1208:5<br /> index 0 is out of range for type &amp;#39;struct ieee80211_channel *[] __counted_by(n_channels)&amp;#39; (aka &amp;#39;struct ieee80211_channel *[]&amp;#39;)<br /> <br /> This was missed in the initial conversions because I failed to locate<br /> the allocation likely due to the "sizeof(void *)" not matching the<br /> "channels" array type.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-38014

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dmaengine: idxd: Refactor remove call with idxd_cleanup() helper<br /> <br /> The idxd_cleanup() helper cleans up perfmon, interrupts, internals and<br /> so on. Refactor remove call with the idxd_cleanup() helper to avoid code<br /> duplication. Note, this also fixes the missing put_device() for idxd<br /> groups, enginces and wqs.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-38007

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HID: uclogic: Add NULL check in uclogic_input_configured()<br /> <br /> devm_kasprintf() returns NULL when memory allocation fails. Currently,<br /> uclogic_input_configured() does not check for this case, which results<br /> in a NULL pointer dereference.<br /> <br /> Add NULL check after devm_kasprintf() to prevent this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-1088

Publication date:
18/06/2025
In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.<br /> This issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-23999

Publication date:
18/06/2025
Missing Authorization vulnerability in Cloudways Breeze allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Breeze: from n/a through 2.2.13.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-38005

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dmaengine: ti: k3-udma: Add missing locking<br /> <br /> Recent kernels complain about a missing lock in k3-udma.c when the lock<br /> validator is enabled:<br /> <br /> [ 4.128073] WARNING: CPU: 0 PID: 746 at drivers/dma/ti/../virt-dma.h:169 udma_start.isra.0+0x34/0x238<br /> [ 4.137352] CPU: 0 UID: 0 PID: 746 Comm: kworker/0:3 Not tainted 6.12.9-arm64 #28<br /> [ 4.144867] Hardware name: pp-v12 (DT)<br /> [ 4.148648] Workqueue: events udma_check_tx_completion<br /> [ 4.153841] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> [ 4.160834] pc : udma_start.isra.0+0x34/0x238<br /> [ 4.165227] lr : udma_start.isra.0+0x30/0x238<br /> [ 4.169618] sp : ffffffc083cabcf0<br /> [ 4.172963] x29: ffffffc083cabcf0 x28: 0000000000000000 x27: ffffff800001b005<br /> [ 4.180167] x26: ffffffc0812f0000 x25: 0000000000000000 x24: 0000000000000000<br /> [ 4.187370] x23: 0000000000000001 x22: 00000000e21eabe9 x21: ffffff8000fa0670<br /> [ 4.194571] x20: ffffff8001b6bf00 x19: ffffff8000fa0430 x18: ffffffc083b95030<br /> [ 4.201773] x17: 0000000000000000 x16: 00000000f0000000 x15: 0000000000000048<br /> [ 4.208976] x14: 0000000000000048 x13: 0000000000000000 x12: 0000000000000001<br /> [ 4.216179] x11: ffffffc08151a240 x10: 0000000000003ea1 x9 : ffffffc08046ab68<br /> [ 4.223381] x8 : ffffffc083cabac0 x7 : ffffffc081df3718 x6 : 0000000000029fc8<br /> [ 4.230583] x5 : ffffffc0817ee6d8 x4 : 0000000000000bc0 x3 : 0000000000000000<br /> [ 4.237784] x2 : 0000000000000000 x1 : 00000000001fffff x0 : 0000000000000000<br /> [ 4.244986] Call trace:<br /> [ 4.247463] udma_start.isra.0+0x34/0x238<br /> [ 4.251509] udma_check_tx_completion+0xd0/0xdc<br /> [ 4.256076] process_one_work+0x244/0x3fc<br /> [ 4.260129] process_scheduled_works+0x6c/0x74<br /> [ 4.264610] worker_thread+0x150/0x1dc<br /> [ 4.268398] kthread+0xd8/0xe8<br /> [ 4.271492] ret_from_fork+0x10/0x20<br /> [ 4.275107] irq event stamp: 220<br /> [ 4.278363] hardirqs last enabled at (219): [] _raw_spin_unlock_irq+0x38/0x50<br /> [ 4.287183] hardirqs last disabled at (220): [] el1_dbg+0x24/0x50<br /> [ 4.294879] softirqs last enabled at (182): [] handle_softirqs+0x1c0/0x3cc<br /> [ 4.303437] softirqs last disabled at (177): [] __do_softirq+0x1c/0x28<br /> [ 4.311559] ---[ end trace 0000000000000000 ]---<br /> <br /> This commit adds the missing locking.
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-38006

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: mctp: Don&amp;#39;t access ifa_index when missing<br /> <br /> In mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but<br /> only when the struct ifaddrmsg is provided. Otherwise it will be<br /> comparing to uninitialised memory - reproducible in the syzkaller case from<br /> dhcpd, or busybox "ip addr show".<br /> <br /> The kernel MCTP implementation has always filtered by ifa_index, so<br /> existing userspace programs expecting to dump MCTP addresses must<br /> already be passing a valid ifa_index value (either 0 or a real index).<br /> <br /> BUG: KMSAN: uninit-value in mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128<br /> mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128<br /> rtnl_dump_all+0x3ec/0x5b0 net/core/rtnetlink.c:4380<br /> rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6824<br /> netlink_dump+0x97b/0x1690 net/netlink/af_netlink.c:2309
Severity CVSS v4.0: Pending analysis
Last modification:
18/06/2025

CVE-2025-5981

Publication date:
18/06/2025
Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR&amp;#39;s unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.
Severity CVSS v4.0: MEDIUM
Last modification:
18/06/2025

CVE-2025-1562

Publication date:
18/06/2025
The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025