Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-9091

Publication date:
17/08/2025
A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: LOW
Last modification:
21/08/2025

CVE-2025-9090

Publication date:
17/08/2025
A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine of the file /goform/telnet of the component Telnet Service. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
21/08/2025

CVE-2025-9089

Publication date:
17/08/2025
A vulnerability was determined in Tenda AC20 16.03.08.12. This issue affects the function sub_48E628 of the file /goform/SetIpMacBind. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
21/08/2025

CVE-2025-9087

Publication date:
16/08/2025
A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
21/08/2025

CVE-2025-9088

Publication date:
16/08/2025
A vulnerability was found in Tenda AC20 16.03.08.12. This vulnerability affects the function save_virtualser_data of the file /goform/formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
21/08/2025

CVE-2023-32249

Publication date:
16/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: not allow guest user on multichannel<br /> <br /> This patch return STATUS_NOT_SUPPORTED if binding session is guest.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2023-3865

Publication date:
16/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: fix out-of-bound read in smb2_write<br /> <br /> ksmbd_smb2_check_message doesn&amp;#39;t validate hdr-&gt;NextCommand. If<br /> -&gt;NextCommand is bigger than Offset + Length of smb2 write, It will<br /> allow oversized smb2 write length. It will cause OOB read in smb2_write.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2023-3866

Publication date:
16/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: validate session id and tree id in the compound request<br /> <br /> This patch validate session id and tree id in compound request.<br /> If first operation in the compound is SMB2 ECHO request, ksmbd bypass<br /> session and tree validation. So work-&gt;sess and work-&gt;tcon could be NULL.<br /> If secound request in the compound access work-&gt;sess or tcon, It cause<br /> NULL pointer dereferecing error.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2023-3867

Publication date:
16/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: fix out of bounds read in smb2_sess_setup<br /> <br /> ksmbd does not consider the case of that smb2 session setup is<br /> in compound request. If this is the second payload of the compound,<br /> OOB read issue occurs while processing the first payload in<br /> the smb2_sess_setup().
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2023-4130

Publication date:
16/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea()<br /> <br /> There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request<br /> from client. ksmbd find next smb2_ea_info using -&gt;NextEntryOffset of<br /> current smb2_ea_info. ksmbd need to validate buffer length Before<br /> accessing the next ea. ksmbd should check buffer length using buf_len,<br /> not next variable. next is the start offset of current ea that got from<br /> previous ea.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2023-4515

Publication date:
16/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: validate command request size<br /> <br /> In commit 2b9b8f3b68ed ("ksmbd: validate command payload size"), except<br /> for SMB2_OPLOCK_BREAK_HE command, the request size of other commands<br /> is not checked, it&amp;#39;s not expected. Fix it by add check for request<br /> size of other commands.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2023-32246

Publication date:
16/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: call rcu_barrier() in ksmbd_server_exit()<br /> <br /> racy issue is triggered the bug by racing between closing a connection<br /> and rmmod. In ksmbd, rcu_barrier() is not called at module unload time,<br /> so nothing prevents ksmbd from getting unloaded while it still has RCU<br /> callbacks pending. It leads to trigger unintended execution of kernel<br /> code locally and use to defeat protections such as Kernel Lockdown
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025