Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-61430

Publication date:
24/10/2025
Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-60569

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetRoute.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2025-60568

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvFirewall.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2025-56438

Publication date:
24/10/2025
An issue in the firmware update mechanism of Nous W3 Smart WiFi Camera v1.33.50.82 allows unauthenticated and physically proximate attackers to escalate privileges to root via supplying a crafted update.tar archive file stored on a FAT32-formatted SD card.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-43994

Publication date:
24/10/2025
Dell Storage Center - Dell Storage Manager, version(s) DSM 20.1.21, contain(s) a Missing Authentication for Critical Function vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-43995

Publication date:
24/10/2025
Dell Storage Center - Dell Storage Manager, version(s) 20.1.21, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass. Authentication Bypass in DSM Data Collector. An unauthenticated remote attacker can access APIs exposed by ApiProxy.war in DataCollectorEar.ear by using a special SessionKey and UserId. These userid are special users created in compellentservicesapi for special purposes.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-11145

Publication date:
24/10/2025
Observable Discrepancy, Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. EnVision allows Account Footprinting.This issue affects enVision: before 250566.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-46425

Publication date:
24/10/2025
Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-46185

Publication date:
24/10/2025
An Insecure Permission vulnerability in pgcodekeeper 10.12.0 allows a local attacker to obtain sensitive information via the plaintext storage of passwords and usernames.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-46183

Publication date:
24/10/2025
The Utils.deserialize function in pgCodeKeeper 10.12.0 processes serialized data from untrusted sources. If an attacker provides a specially crafted .ser file, deserialization may result in unintended code execution or other malicious behavior on the target system.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2021-43768

Publication date:
24/10/2025
In Malwarebytes For Teams v.1.0.990 and before and fixed in v.1.0.1003 and later a privilege escalation can occur via the COM interface running in mbamservice.exe.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-40020

Publication date:
24/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: peak_usb: fix shift-out-of-bounds issue<br /> <br /> Explicitly uses a 64-bit constant when the number of bits used for its<br /> shifting is 32 (which is the case for PC CAN FD interfaces supported by<br /> this driver).<br /> <br /> [mkl: update subject, apply manually]
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026