Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-32916

Publication date:
09/10/2025
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions
Severity CVSS v4.0: LOW
Last modification:
04/12/2025

CVE-2025-62228

Publication date:
09/10/2025
Apache Flink CDC version 3.4.0 was vulnerable to a SQL injection via maliciously crafted identifiers eg. crafted database name or crafted table name. Even through only the logged-in database user can trigger the attack, we recommend users update Flink CDC version to 3.5.0 which address this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
03/12/2025

CVE-2025-36171

Publication date:
09/10/2025
IBM Aspera Faspex 5.0.0 through 5.0.13.1 could allow a privileged user to cause a denial of service from improperly validated API input due to excessive resource consumption.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2025

CVE-2025-36225

Publication date:
09/10/2025
IBM Aspera 5.0.0 through 5.0.13.1 <br /> <br /> could disclose sensitive user information from the system to an authenticated user due to an observable discrepancy of returned data.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2025

CVE-2025-11561

Publication date:
09/10/2025
A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.
Severity CVSS v4.0: Pending analysis
Last modification:
22/01/2026

CVE-2023-37401

Publication date:
09/10/2025
IBM Aspera Faspex 5.0.0 through 5.0.13.1 uses a cross-domain policy file that includes domains that should not be trusted.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2025

CVE-2025-39963

Publication date:
09/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> io_uring: fix incorrect io_kiocb reference in io_link_skb<br /> <br /> In io_link_skb function, there is a bug where prev_notif is incorrectly<br /> assigned using &amp;#39;nd&amp;#39; instead of &amp;#39;prev_nd&amp;#39;. This causes the context<br /> validation check to compare the current notification with itself instead<br /> of comparing it with the previous notification.<br /> <br /> Fix by using the correct prev_nd parameter when obtaining prev_notif.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2025-39962

Publication date:
09/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rxrpc: Fix untrusted unsigned subtract<br /> <br /> Fix the following Smatch static checker warning:<br /> <br /> net/rxrpc/rxgk_app.c:65 rxgk_yfs_decode_ticket()<br /> warn: untrusted unsigned subtract. &amp;#39;ticket_len - 10 * 4&amp;#39;<br /> <br /> by prechecking the length of what we&amp;#39;re trying to extract in two places in<br /> the token and decoding for a response packet.<br /> <br /> Also use sizeof() on the struct we&amp;#39;re extracting rather specifying the size<br /> numerically to be consistent with the other related statements.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2025-39961

Publication date:
09/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iommu/amd/pgtbl: Fix possible race while increase page table level<br /> <br /> The AMD IOMMU host page table implementation supports dynamic page table levels<br /> (up to 6 levels), starting with a 3-level configuration that expands based on<br /> IOVA address. The kernel maintains a root pointer and current page table level<br /> to enable proper page table walks in alloc_pte()/fetch_pte() operations.<br /> <br /> The IOMMU IOVA allocator initially starts with 32-bit address and onces its<br /> exhuasted it switches to 64-bit address (max address is determined based<br /> on IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU<br /> driver increases page table level.<br /> <br /> But in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads<br /> pgtable-&gt;[root/mode] without lock. So its possible that in exteme corner case,<br /> when increase_address_space() is updating pgtable-&gt;[root/mode], fetch_pte()<br /> reads wrong page table level (pgtable-&gt;mode). It does compare the value with<br /> level encoded in page table and returns NULL. This will result is<br /> iommu_unmap ops to fail and upper layer may retry/log WARN_ON.<br /> <br /> CPU 0 CPU 1<br /> ------ ------<br /> map pages unmap pages<br /> alloc_pte() -&gt; increase_address_space() iommu_v1_unmap_pages() -&gt; fetch_pte()<br /> pgtable-&gt;root = pte (new root value)<br /> READ pgtable-&gt;[mode/root]<br /> Reads new root, old mode<br /> Updates mode (pgtable-&gt;mode += 1)<br /> <br /> Since Page table level updates are infrequent and already synchronized with a<br /> spinlock, implement seqcount to enable lock-free read operations on the read path.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2025-39960

Publication date:
09/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gpiolib: acpi: initialize acpi_gpio_info struct<br /> <br /> Since commit 7c010d463372 ("gpiolib: acpi: Make sure we fill struct<br /> acpi_gpio_info"), uninitialized acpi_gpio_info struct are passed to<br /> __acpi_find_gpio() and later in the call stack info-&gt;quirks is used in<br /> acpi_populate_gpio_lookup. This breaks the i2c_hid_cpi driver:<br /> <br /> [ 58.122916] i2c_hid_acpi i2c-UNIW0001:00: HID over i2c has not been provided an Int IRQ<br /> [ 58.123097] i2c_hid_acpi i2c-UNIW0001:00: probe with driver i2c_hid_acpi failed with error -22<br /> <br /> Fix this by initializing the acpi_gpio_info pass to __acpi_find_gpio()
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2025-10239

Publication date:
09/10/2025
In Flowmon versions prior to 12.5.5, a vulnerability has been identified that allows a user with administrator privileges and access to the management interface to execute additional unintended commands within scripts intended for troubleshooting purposes.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2025

CVE-2025-10240

Publication date:
09/10/2025
A vulnerability exists in the Progress Flowmon web application prior to version 12.5.5, whereby a user who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated session.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2025