Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-32439

Publication date:
15/04/2025
pleezer is a headless Deezer Connect player. Hook scripts in pleezer can be triggered by various events like track changes and playback state changes. In versions before 0.16.0, these scripts were spawned without proper process cleanup, leaving zombie processes in the system's process table. Even during normal usage, every track change and playback event would leave behind zombie processes. This leads to inevitable resource exhaustion over time as the system's process table fills up, eventually preventing new processes from being created. The issue is exacerbated if events occur rapidly, whether through normal use (e.g., skipping through a playlist) or potential manipulation of the Deezer Connect protocol traffic. This issue has been fixed in version 0.16.0.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-32445

Publication date:
15/04/2025
Argo Events is an event-driven workflow automation framework for Kubernetes. A user with permission to create/modify EventSource and Sensor custom resources can gain privileged access to the host system and cluster, even without having direct administrative privileges. The EventSource and Sensor CRs allow the corresponding orchestrated pod to be customized with spec.template and spec.template.container (with type k8s.io/api/core/v1.Container), thus, any specification under container such as command, args, securityContext , volumeMount can be specified, and applied to the EventSource or Sensor pod. With these, a user would be able to gain privileged access to the cluster host, if he/she specified the EventSource/Sensor CR with some particular properties under template. This vulnerability is fixed in v1.9.6.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-1122

Publication date:
15/04/2025
Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 15753.50.0 stable on Cr50 Boards allows an attacker with root access to gain persistence and <br /> Bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2025

CVE-2025-1292

Publication date:
15/04/2025
Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132 stable on Cr50 Boards allows an attacker with root access to gain persistence and <br /> bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2025

CVE-2025-2567

Publication date:
15/04/2025
An attacker could modify or disable settings, disrupt fuel monitoring <br /> and supply chain operations, leading to disabling of ATG monitoring. <br /> This would result in potential safety hazards in fuel storage and <br /> transportation.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-25456

Publication date:
15/04/2025
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via mac2.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2025-28399

Publication date:
15/04/2025
An issue in Erick xmall v.1.1 and before allows a remote attacker to escalate privileges via the updateAddress method of the Address Controller class.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2025-22903

Publication date:
15/04/2025
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the pin parameter in the function setWiFiWpsConfig.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2025-29213

Publication date:
15/04/2025
A zip slip vulnerability in the component \service\migrate\MigrateForm.java of JEEWMS v3.7 allows attackers to execute arbitrary code via a crafted Zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2025-24358

Publication date:
15/04/2025
gorilla/csrf provides Cross Site Request Forgery (CSRF) prevention middleware for Go web applications &amp; services. Prior to 1.7.2, gorilla/csrf does not validate the Origin header against an allowlist. Its executes its validation of the Referer header for cross-origin requests only when it believes the request is being served over TLS. It determines this by inspecting the r.URL.Scheme value. However, this value is never populated for "server" requests per the Go spec, and so this check does not run in practice. This vulnerability allows an attacker who has gained XSS on a subdomain or top level domain to perform authenticated form submissions against gorilla/csrf protected targets that share the same top level domain. This vulnerability is fixed in 1.7.2.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-27791

Publication date:
15/04/2025
Collabora Online is a collaborative online office suite based on LibreOffice technology. In versions prior to 24.04.12.4, 23.05.19, and 22.05.25, there is a path traversal flaw in handling the CheckFileInfo BaseFileName field returned from WOPI servers. This allows for a file to be written anywhere the uid running Collabora Online can write, if such a response was supplied by a malicious WOPI server. By combining this flaw with a Time of Check, Time of Use DNS lookup issue with a WOPI server address under attacker control, it is possible to present such a response to be processed by a Collabora Online instance. This issue has been patched in versions 24.04.13.1, 23.05.19, and 22.05.25.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2023-5616

Publication date:
15/04/2025
In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2025