Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-69907

Publication date:
23/01/2026
An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing authentication and access control on the /omnidocs/GetListofCabinet API endpoint. A remote attacker can access this endpoint without valid credentials to retrieve sensitive internal configuration information, including cabinet names and database-related metadata. This allows unauthorized enumeration of backend deployment details and may facilitate further targeted attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-71146

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_conncount: fix leaked ct in error paths<br /> <br /> There are some situations where ct might be leaked as error paths are<br /> skipping the refcounted check and return immediately. In order to solve<br /> it make sure that the check is always called.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-71147

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> KEYS: trusted: Fix a memory leak in tpm2_load_cmd<br /> <br /> &amp;#39;tpm2_load_cmd&amp;#39; allocates a tempoary blob indirectly via &amp;#39;tpm2_key_decode&amp;#39;<br /> but it is not freed in the failure paths. Address this by wrapping the blob<br /> into with a cleanup helper.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-71148

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/handshake: restore destructor on submit failure<br /> <br /> handshake_req_submit() replaces sk-&gt;sk_destruct but never restores it when<br /> submission fails before the request is hashed. handshake_sk_destruct() then<br /> returns early and the original destructor never runs, leaking the socket.<br /> Restore sk_destruct on the error path.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-71149

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> io_uring/poll: correctly handle io_poll_add() return value on update<br /> <br /> When the core of io_uring was updated to handle completions<br /> consistently and with fixed return codes, the POLL_REMOVE opcode<br /> with updates got slightly broken. If a POLL_ADD is pending and<br /> then POLL_REMOVE is used to update the events of that request, if that<br /> update causes the POLL_ADD to now trigger, then that completion is lost<br /> and a CQE is never posted.<br /> <br /> Additionally, ensure that if an update does cause an existing POLL_ADD<br /> to complete, that the completion value isn&amp;#39;t always overwritten with<br /> -ECANCELED. For that case, whatever io_poll_add() set the value to<br /> should just be retained.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-71150

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: Fix refcount leak when invalid session is found on session lookup<br /> <br /> When a session is found but its state is not SMB2_SESSION_VALID, It<br /> indicates that no valid session was found, but it is missing to decrement<br /> the reference count acquired by the session lookup, which results in<br /> a reference count leak. This patch fixes the issue by explicitly calling<br /> ksmbd_user_session_put to release the reference to the session.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-71151

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: Fix memory and information leak in smb3_reconfigure()<br /> <br /> In smb3_reconfigure(), if smb3_sync_session_ctx_passwords() fails, the<br /> function returns immediately without freeing and erasing the newly<br /> allocated new_password and new_password2. This causes both a memory leak<br /> and a potential information leak.<br /> <br /> Fix this by calling kfree_sensitive() on both password buffers before<br /> returning in this error case.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-13921

Publication date:
23/01/2026
The weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki &amp; AI Chatbot plugin for WordPress is vulnerable to unauthorized modification or loss of data due to a missing capability check on the &amp;#39;wedocs_user_documentation_handling_capabilities&amp;#39; function in all versions up to, and including, 2.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit any documentation post. The vulnerability was partially patched in version 2.1.16.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-71145

Publication date:
23/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: phy: isp1301: fix non-OF device reference imbalance<br /> <br /> A recent change fixing a device reference leak in a UDC driver<br /> introduced a potential use-after-free in the non-OF case as the<br /> isp1301_get_client() helper only increases the reference count for the<br /> returned I2C device in the OF case.<br /> <br /> Increment the reference count also for non-OF so that the caller can<br /> decrement it unconditionally.<br /> <br /> Note that this is inherently racy just as using the returned I2C device<br /> is since nothing is preventing the PHY driver from being unbound while<br /> in use.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-4320

Publication date:
23/01/2026
Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Authentication Bypass, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2026-0914

Publication date:
23/01/2026
The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s &amp;#39;lw_content_block&amp;#39; shortcode in all versions up to, and including, 3.1.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026

CVE-2025-4319

Publication date:
23/01/2026
Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Birebirsoft Software and Technology Solutions Sufirmam allows Brute Force, Password Recovery Exploitation.This issue affects Sufirmam: through 23012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
26/01/2026