Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-0997

Publication date:
15/02/2025
Use after free in Navigation in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2025-0998

Publication date:
15/02/2025
Rejected reason: Not exploitable
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2024-37374

Publication date:
15/02/2025
Rejected reason: This CVE record has been withdrawn due to a duplicate entry CVE-2024-13842.
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2025

CVE-2024-37375

Publication date:
15/02/2025
Rejected reason: This CVE record has been withdrawn due to a duplicate entry CVE-2024-13843.
Severity CVSS v4.0: Pending analysis
Last modification:
15/02/2025

CVE-2025-26819

Publication date:
15/02/2025
Monero through 0.18.3.4 before ec74ff4 does not have response limits on HTTP server connections.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2025

CVE-2025-21401

Publication date:
15/02/2025
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2025

CVE-2024-10405

Publication date:
15/02/2025
Brocade SANnav before SANnav 2.3.1b <br /> enables weak TLS ciphers on ports 443 and 18082. In case of a successful<br /> exploit, an attacker can read Brocade SANnav data stream that includes <br /> monitored Brocade Fabric OS switches performance data, port status, <br /> zoning information, WWNs, IP Addresses, but no customer data, no <br /> personal data and no secrets or passwords, as it travels across the <br /> network.
Severity CVSS v4.0: MEDIUM
Last modification:
26/08/2025

CVE-2024-4282

Publication date:
15/02/2025
Brocade SANnav OVA before SANnav 2.3.1b enables SHA1 deprecated setting for SSH for port 22.
Severity CVSS v4.0: HIGH
Last modification:
26/08/2025

CVE-2024-5461

Publication date:
15/02/2025
Implementation of the Simple Network <br /> Management Protocol (SNMP) operating on the Brocade 6547 (FC5022) <br /> embedded switch blade, makes internal script calls to system.sh from <br /> within the SNMP binary. An authenticated attacker could perform command <br /> or parameter injection on SNMP operations that are only enabled on the <br /> Brocade 6547 (FC5022) embedded switch. This injection could allow the <br /> authenticated attacker to issue commands as Root.
Severity CVSS v4.0: HIGH
Last modification:
23/02/2026

CVE-2024-5462

Publication date:
15/02/2025
If Brocade Fabric OS before Fabric OS 9.2.0 configuration settings are not set to encrypt SNMP passwords, then the SNMP privsecret / authsecret fields can be exposed in plaintext. The plaintext passwords can be exposed in a configupload capture or a supportsave capture if encryption of passwords is not enabled. An attacker can use these passwords to fetch values of the supported OIDs via SNMPv3 queries. There are also a limited number of MIB objects that can be modified.
Severity CVSS v4.0: MEDIUM
Last modification:
23/02/2026

CVE-2025-0592

Publication date:
14/02/2025
The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025

CVE-2025-0593

Publication date:
14/02/2025
The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2025