Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-59729

Publication date:
06/10/2025
When parsing the header for a DHAV file, there&amp;#39;s an integer underflow in offset calculation that leads to reading the duration from before the start of the allocated buffer.<br /> <br /> If we load a DHAV file that is larger than MAX_DURATION_BUFFER_SIZE bytes (0x100000) for example 0x101000 bytes, then at [0] we have size = 0x101000. At [1] we have end_buffer_size = 0x100000, and at [2] we have end_buffer_pos = 0x1000.<br /> <br /> The loop then scans backwards through the buffer looking for the dhav tag; when it is found, we&amp;#39;ll calculate end_pos based on a 32-bit offset read from the buffer.<br /> <br /> There is subsequently a check [3] that end_pos is within the section of the file that has been copied into end_buffer, but it only correctly handles the cases where end_pos is before the start of the file or after the section copied into end_buffer, and not the case where end_pos is within the the file, but before the section copied into end_buffer. If we provide such an offset, (end_pos - end_buffer_pos) can underflow, resulting in the subsequent access at [4] occurring before the beginning of the allocation.<br /> <br /> We recommend upgrading to version 8.0 or beyond.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-59730

Publication date:
06/10/2025
When decoding a frame for a SANM file (ANIM v0 variant), the decoded data can be larger than the buffer allocated for it.<br /> <br /> Frames encoded with codec 48 can specify their resolution (width x height). A buffer of appropriate size is allocated depending on the resolution.<br /> <br /> This codec can encode the frame contents using a run-length encoding algorithm. There are no checks that the decoded frame fits in the allocated buffer, leading to a heap-buffer-overflow.<br /> <br /> process_frame_obj initializes the buffers based on the frame resolution:<br /> <br /> <br /> <br /> We recommend upgrading to version 8.0 or beyond.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-59731

Publication date:
06/10/2025
When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data.<br /> <br /> We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td-&gt;rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td-&gt;xsize - 1) * (td-&gt;ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size.<br /> <br /> <br /> <br /> <br /> We recommend upgrading to version 8.0 or beyond.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-59732

Publication date:
06/10/2025
When decoding an OpenEXR file that uses DWAA or DWAB compression, there&amp;#39;s an implicit assumption that the height and width are divisible by 8.<br /> <br /> If the height or width of the image is not divisible by 8, the copy loops at [0] and [1] will continue to write until the next multiple of 8.<br /> <br /> The buffer td-&gt;uncompressed_data is allocated in decode_block based on the precise height and width of the image, so the "rounded-up" multiple of 8 in the copy loop can exceed the buffer bounds, and the write block starting at [2] can corrupt following heap memory.<br /> <br /> <br /> <br /> We recommend upgrading to version 8.0 or beyond.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-11327

Publication date:
06/10/2025
A security vulnerability has been detected in Tenda AC18 15.03.05.19(6318). This vulnerability affects unknown code of the file /goform/SetUpnpCfg. The manipulation of the argument upnpEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Severity CVSS v4.0: HIGH
Last modification:
07/10/2025

CVE-2025-11326

Publication date:
06/10/2025
A weakness has been identified in Tenda AC18 15.03.05.19(6318). This affects an unknown part of the file /goform/WifiMacFilterSet. Executing a manipulation of the argument wifi_chkHz can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Severity CVSS v4.0: HIGH
Last modification:
24/02/2026

CVE-2025-58591

Publication date:
06/10/2025
A remote, unauthorized attacker can brute force folders and files and read them like private keys or configurations, making the application vulnerable for gathering sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-9913

Publication date:
06/10/2025
JavaScript can be ran inside the address bar via the dashboard "Open in new Tab" Button, making the application vulnerable to session hijacking.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2026

CVE-2025-9914

Publication date:
06/10/2025
The credentials of the users stored in the system&amp;#39;s local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2026

CVE-2025-58590

Publication date:
06/10/2025
It&amp;#39;s possible to brute force folders and files, what can be used by an attacker to steal sensitve information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58589

Publication date:
06/10/2025
When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker thus receives information about the technology used and the structure of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58587

Publication date:
06/10/2025
The application does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it possible for an attacker to guess user credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026