Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-22020

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove<br /> <br /> This fixes the following crash:<br /> <br /> ==================================================================<br /> BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]<br /> Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241<br /> <br /> CPU: 6 UID: 0 PID: 140241 Comm: kworker/6:0 Kdump: loaded Tainted: G E 6.14.0-rc6+ #1<br /> Tainted: [E]=UNSIGNED_MODULE<br /> Hardware name: LENOVO 30FNA1V7CW/1057, BIOS S0EKT54A 07/01/2024<br /> Workqueue: events rtsx_usb_ms_poll_card [rtsx_usb_ms]<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x51/0x70<br /> print_address_description.constprop.0+0x27/0x320<br /> ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]<br /> print_report+0x3e/0x70<br /> kasan_report+0xab/0xe0<br /> ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]<br /> rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]<br /> ? __pfx_rtsx_usb_ms_poll_card+0x10/0x10 [rtsx_usb_ms]<br /> ? __pfx___schedule+0x10/0x10<br /> ? kick_pool+0x3b/0x270<br /> process_one_work+0x357/0x660<br /> worker_thread+0x390/0x4c0<br /> ? __pfx_worker_thread+0x10/0x10<br /> kthread+0x190/0x1d0<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork+0x2d/0x50<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork_asm+0x1a/0x30<br /> <br /> <br /> Allocated by task 161446:<br /> kasan_save_stack+0x20/0x40<br /> kasan_save_track+0x10/0x30<br /> __kasan_kmalloc+0x7b/0x90<br /> __kmalloc_noprof+0x1a7/0x470<br /> memstick_alloc_host+0x1f/0xe0 [memstick]<br /> rtsx_usb_ms_drv_probe+0x47/0x320 [rtsx_usb_ms]<br /> platform_probe+0x60/0xe0<br /> call_driver_probe+0x35/0x120<br /> really_probe+0x123/0x410<br /> __driver_probe_device+0xc7/0x1e0<br /> driver_probe_device+0x49/0xf0<br /> __device_attach_driver+0xc6/0x160<br /> bus_for_each_drv+0xe4/0x160<br /> __device_attach+0x13a/0x2b0<br /> bus_probe_device+0xbd/0xd0<br /> device_add+0x4a5/0x760<br /> platform_device_add+0x189/0x370<br /> mfd_add_device+0x587/0x5e0<br /> mfd_add_devices+0xb1/0x130<br /> rtsx_usb_probe+0x28e/0x2e0 [rtsx_usb]<br /> usb_probe_interface+0x15c/0x460<br /> call_driver_probe+0x35/0x120<br /> really_probe+0x123/0x410<br /> __driver_probe_device+0xc7/0x1e0<br /> driver_probe_device+0x49/0xf0<br /> __device_attach_driver+0xc6/0x160<br /> bus_for_each_drv+0xe4/0x160<br /> __device_attach+0x13a/0x2b0<br /> rebind_marked_interfaces.isra.0+0xcc/0x110<br /> usb_reset_device+0x352/0x410<br /> usbdev_do_ioctl+0xe5c/0x1860<br /> usbdev_ioctl+0xa/0x20<br /> __x64_sys_ioctl+0xc5/0xf0<br /> do_syscall_64+0x59/0x170<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> Freed by task 161506:<br /> kasan_save_stack+0x20/0x40<br /> kasan_save_track+0x10/0x30<br /> kasan_save_free_info+0x36/0x60<br /> __kasan_slab_free+0x34/0x50<br /> kfree+0x1fd/0x3b0<br /> device_release+0x56/0xf0<br /> kobject_cleanup+0x73/0x1c0<br /> rtsx_usb_ms_drv_remove+0x13d/0x220 [rtsx_usb_ms]<br /> platform_remove+0x2f/0x50<br /> device_release_driver_internal+0x24b/0x2e0<br /> bus_remove_device+0x124/0x1d0<br /> device_del+0x239/0x530<br /> platform_device_del.part.0+0x19/0xe0<br /> platform_device_unregister+0x1c/0x40<br /> mfd_remove_devices_fn+0x167/0x170<br /> device_for_each_child_reverse+0xc9/0x130<br /> mfd_remove_devices+0x6e/0xa0<br /> rtsx_usb_disconnect+0x2e/0xd0 [rtsx_usb]<br /> usb_unbind_interface+0xf3/0x3f0<br /> device_release_driver_internal+0x24b/0x2e0<br /> proc_disconnect_claim+0x13d/0x220<br /> usbdev_do_ioctl+0xb5e/0x1860<br /> usbdev_ioctl+0xa/0x20<br /> __x64_sys_ioctl+0xc5/0xf0<br /> do_syscall_64+0x59/0x170<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> Last potentially related work creation:<br /> kasan_save_stack+0x20/0x40<br /> kasan_record_aux_stack+0x85/0x90<br /> insert_work+0x29/0x100<br /> __queue_work+0x34a/0x540<br /> call_timer_fn+0x2a/0x160<br /> expire_timers+0x5f/0x1f0<br /> __run_timer_base.part.0+0x1b6/0x1e0<br /> run_timer_softirq+0x8b/0xe0<br /> handle_softirqs+0xf9/0x360<br /> __irq_exit_rcu+0x114/0x130<br /> sysvec_apic_timer_interrupt+0x72/0x90<br /> asm_sysvec_apic_timer_interrupt+0x16/0x20<br /> <br /> Second to last potentially related work creation:<br /> kasan_save_stack+0x20/0x40<br /> kasan_record_aux_stack+0x85/0x90<br /> insert_work+0x29/0x100<br /> __queue_work+0x34a/0x540<br /> call_timer_fn+0x2a/0x160<br /> expire_timers+0x5f/0x1f0<br /> __run_timer_base.part.0+0x1b6/0x1e0<br /> run_timer_softirq+0x8b/0xe0<br /> handle_softirqs+0xf9/0x<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-22021

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: socket: Lookup orig tuple for IPv6 SNAT<br /> <br /> nf_sk_lookup_slow_v4 does the conntrack lookup for IPv4 packets to<br /> restore the original 5-tuple in case of SNAT, to be able to find the<br /> right socket (if any). Then socket_match() can correctly check whether<br /> the socket was transparent.<br /> <br /> However, the IPv6 counterpart (nf_sk_lookup_slow_v6) lacks this<br /> conntrack lookup, making xt_socket fail to match on the socket when the<br /> packet was SNATed. Add the same logic to nf_sk_lookup_slow_v6.<br /> <br /> IPv6 SNAT is used in Kubernetes clusters for pod-to-world packets, as<br /> pods&amp;#39; addresses are in the fd00::/8 ULA subnet and need to be replaced<br /> with the node&amp;#39;s external address. Cilium leverages Envoy to enforce L7<br /> policies, and Envoy uses transparent sockets. Cilium inserts an iptables<br /> prerouting rule that matches on `-m socket --transparent` and redirects<br /> the packets to localhost, but it fails to match SNATed IPv6 packets due<br /> to that missing conntrack lookup.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-31363

Publication date:
16/04/2025
Mattermost versions 10.4.x
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2025-3679

Publication date:
16/04/2025
A vulnerability, which was classified as critical, was found in PCMan FTP Server 2.0.7. Affected is an unknown function of the component HOST Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
23/04/2025

CVE-2025-3680

Publication date:
16/04/2025
A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this vulnerability is an unknown functionality of the component LANG Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
29/04/2025

CVE-2025-3681

Publication date:
16/04/2025
A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this issue is some unknown functionality of the component MODE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
29/04/2025

CVE-2025-27936

Publication date:
16/04/2025
Mattermost Plugin MSTeams versions
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2026

CVE-2025-3678

Publication date:
16/04/2025
A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component HELP Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
12/05/2025

CVE-2025-3104

Publication date:
16/04/2025
The WP STAGING Pro WordPress Backup Plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 6.1.2 due to missing capability checks on the getOutdatedPluginsRequest() function. This makes it possible for unauthenticated attackers to reveal outdated installed active or inactive plugins.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-3677

Publication date:
16/04/2025
A vulnerability classified as critical was found in lm-sys fastchat up to 0.2.36. This vulnerability affects the function split_files/apply_delta_low_cpu_mem of the file fastchat/model/apply_delta.py. The manipulation leads to deserialization. An attack has to be approached locally.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2024-22036

Publication date:
16/04/2025
A vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the chroot<br /> jail and gain root access to the Rancher container itself. In <br /> production environments, further privilege escalation is possible based <br /> on living off the land within the Rancher container itself. For the test<br /> and development environments, based on a –privileged Docker container, <br /> it is possible to escape the Docker container and gain execution access <br /> on the host system.<br /> <br /> <br /> This issue affects rancher: from 2.7.0 before 2.7.16, from 2.8.0 before 2.8.9, from 2.9.0 before 2.9.3.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-52281

Publication date:
16/04/2025
A: Improper Neutralization of Input During Web Page Generation vulnerability in SUSE rancher allows a malicious actor to perform a Stored XSS attack through the cluster description field.<br /> This issue affects rancher: from 2.9.0 before 2.9.4.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026