Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-40113

Publication date:
12/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E<br /> <br /> The ADSP firmware on X1E has separate firmware binaries for the main<br /> firmware and the DTB. The same applies for the "lite" firmware loaded by<br /> the boot firmware.<br /> <br /> When preparing to load the new ADSP firmware we shutdown the lite_pas_id<br /> for the main firmware, but we don&amp;#39;t shutdown the corresponding lite pas_id<br /> for the DTB. The fact that we&amp;#39;re leaving it "running" forever becomes<br /> obvious if you try to reuse (or just access) the memory region used by the<br /> "lite" firmware: The &amp;adsp_boot_mem is accessible, but accessing the<br /> &amp;adsp_boot_dtb_mem results in a crash.<br /> <br /> We don&amp;#39;t support reusing the memory regions currently, but nevertheless we<br /> should not keep part of the lite firmware running. Fix this by adding the<br /> lite_dtb_pas_id and shutting it down as well.<br /> <br /> We don&amp;#39;t have a way to detect if the lite firmware is actually running yet,<br /> so ignore the return status of qcom_scm_pas_shutdown() for now. This was<br /> already the case before, the assignment to "ret" is not used anywhere.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-40115

Publication date:
12/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()<br /> <br /> During mpt3sas_transport_port_remove(), messages were logged with<br /> dev_printk() against &amp;mpt3sas_port-&gt;port-&gt;dev. At this point the SAS<br /> transport device may already be partially unregistered or freed, leading<br /> to a crash when accessing its struct device.<br /> <br /> Using ioc_info(), which logs via the PCI device (ioc-&gt;pdev-&gt;dev),<br /> guaranteed to remain valid until driver removal.<br /> <br /> [83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI<br /> [83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)<br /> [83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE<br /> [83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024<br /> [83428.295799] RIP: 0010:__dev_printk+0x1f/0x70<br /> [83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff<br /> [83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206<br /> [83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32<br /> [83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845<br /> [83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8<br /> [83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000<br /> [83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30<br /> [83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000<br /> [83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0<br /> [83428.295844] PKRU: 55555554<br /> [83428.295846] Call Trace:<br /> [83428.295848] <br /> [83428.295850] _dev_printk+0x5c/0x80<br /> [83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5<br /> [83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]<br /> [83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]<br /> [83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]<br /> [83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5<br /> [83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]<br /> [83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]<br /> [83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]<br /> [83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]<br /> [83428.295957] pci_device_remove+0x3b/0xb0<br /> [83428.295962] device_release_driver_internal+0x193/0x200<br /> [83428.295968] driver_detach+0x44/0x90<br /> [83428.295971] bus_remove_driver+0x69/0xf0<br /> [83428.295975] pci_unregister_driver+0x2a/0xb0<br /> [83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]<br /> [83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310<br /> [83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5<br /> [83428.296000] ? __x64_sys_getdents64+0x9a/0x110<br /> [83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5<br /> [83428.296009] ? syscall_trace_enter+0xf6/0x1b0<br /> [83428.296014] do_syscall_64+0x7b/0x2c0<br /> [83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5<br /> [83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-40116

Publication date:
12/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup<br /> <br /> The kthread_run() function returns error pointers so the<br /> max3421_hcd-&gt;spi_thread pointer can be either error pointers or NULL.<br /> Check for both before dereferencing it.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-11454

Publication date:
12/11/2025
The Specific Content For Mobile – Customize the mobile version without redirections plugin for WordPress is vulnerable to SQL Injection via the eos_scfm_duplicate_post_as_draft() function in all versions up to, and including, 0.5.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with COntributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-64407

Publication date:
12/11/2025
Apache OpenOffice documents can contain links. A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause external links <br /> to be loaded without prompt. Such links could also be used to transmit system information, such as environment variables or configuration settings.<br /> <br /> In the affected versions of Apache OpenOffice, documents that used a certain URI scheme linking to external files would <br /> load the contents of such files without prompting the user for <br /> permission to do so. Such URI scheme allows to include system configuration data, that is not supposed to be transmitted externally.<br /> <br /> This issue affects Apache OpenOffice: through 4.1.15.<br /> <br /> Users are recommended to upgrade to version 4.1.16, which fixes the issue.<br /> <br /> <br /> <br /> <br /> <br /> The LibreOffice suite reported this issue as CVE-2024-12426.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-61623

Publication date:
12/11/2025
Reflected cross-site scripting vulnerability in Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 24.09.03.<br /> <br /> Users are recommended to upgrade to version 24.09.03, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-59118

Publication date:
12/11/2025
Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz.<br /> <br /> This issue affects Apache OFBiz: before 24.09.03.<br /> <br /> Users are recommended to upgrade to version 24.09.03, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-37734

Publication date:
12/11/2025
Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant.
Severity CVSS v4.0: Pending analysis
Last modification:
11/12/2025

CVE-2025-12382

Publication date:
12/11/2025
Improper Limitation of a Pathname &amp;#39;Path Traversal&amp;#39;) vulnerability in Algosec Firewall Analyzer on Linux, 64 bit allows an authenticated user to upload files to a restricted directory leading to code injection. This issue affects Algosec Firewall Analyzer: A33.0 (up to build 320), A33.10 (up to build 210).
Severity CVSS v4.0: HIGH
Last modification:
11/12/2025

CVE-2025-11962

Publication date:
12/11/2025
Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in DivvyDrive Information Technologies Inc. Digital Corporate Warehouse allows Stored XSS.This issue affects Digital Corporate Warehouse: before v.4.8.2.22.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-64406

Publication date:
12/11/2025
An out-of-bounds Write vulnerability in Apache OpenOffice could allow an attacker to craft a document that would crash the program, or otherwise corrupt other memory areas.<br /> <br /> This issue affects Apache OpenOffice: through 4.1.15.<br /> <br /> Users are recommended to upgrade to version 4.1.16, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-64403

Publication date:
12/11/2025
Apache OpenOffice Calc spreadsheet can contain links to other files, in the form of "external data sources". A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause such links <br /> to be loaded without prompt.<br /> <br /> This issue affects Apache OpenOffice: through 4.1.15.<br /> <br /> Users are recommended to upgrade to version 4.1.16, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025