Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-49762

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ntfs: check overflow when iterating ATTR_RECORDs<br /> <br /> Kernel iterates over ATTR_RECORDs in mft record in ntfs_attr_find(). <br /> Because the ATTR_RECORDs are next to each other, kernel can get the next<br /> ATTR_RECORD from end address of current ATTR_RECORD, through current<br /> ATTR_RECORD length field.<br /> <br /> The problem is that during iteration, when kernel calculates the end<br /> address of current ATTR_RECORD, kernel may trigger an integer overflow bug<br /> in executing `a = (ATTR_RECORD*)((u8*)a + le32_to_cpu(a-&gt;length))`. This<br /> may wrap, leading to a forever iteration on 32bit systems.<br /> <br /> This patch solves it by adding some checks on calculating end address<br /> of current ATTR_RECORD during iteration.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2020-36790

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nvmet: fix a memory leak<br /> <br /> We forgot to free new_model_number
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-44835

Publication date:
01/05/2025
D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in iptablesWebsFilterRun, which allows remote attackers to execute arbitrary commands via shell.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2025-44854

Publication date:
01/05/2025
TOTOLINK CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2025-37795

Publication date:
01/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2025

CVE-2025-37796

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: at76c50x: fix use after free access in at76_disconnect<br /> <br /> The memory pointed to by priv is freed at the end of at76_delete_device<br /> function (using ieee80211_free_hw). But the code then accesses the udev<br /> field of the freed object to put the USB device. This may also lead to a<br /> memory leak of the usb device. Fix this by using udev from interface.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-37793

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()<br /> <br /> devm_kasprintf() returns NULL when memory allocation fails. Currently,<br /> avs_component_probe() does not check for this case, which results in a<br /> NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-37792

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: btrtl: Prevent potential NULL dereference<br /> <br /> The btrtl_initialize() function checks that rtl_load_file() either<br /> had an error or it loaded a zero length file. However, if it loaded<br /> a zero length file then the error code is not set correctly. It<br /> results in an error pointer vs NULL bug, followed by a NULL pointer<br /> dereference. This was detected by Smatch:<br /> <br /> drivers/bluetooth/btrtl.c:592 btrtl_initialize() warn: passing zero to &amp;#39;ERR_PTR&amp;#39;
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-37788

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path<br /> <br /> In the for loop used to allocate the loc_array and bmap for each port, a<br /> memory leak is possible when the allocation for loc_array succeeds,<br /> but the allocation for bmap fails. This is because when the control flow<br /> goes to the label free_eth_finfo, only the allocations starting from<br /> (i-1)th iteration are freed.<br /> <br /> Fix that by freeing the loc_array in the bmap allocation error path.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-37789

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: openvswitch: fix nested key length validation in the set() action<br /> <br /> It&amp;#39;s not safe to access nla_len(ovs_key) if the data is smaller than<br /> the netlink header. Check that the attribute is OK first.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-37790

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: mctp: Set SOCK_RCU_FREE<br /> <br /> Bind lookup runs under RCU, so ensure that a socket doesn&amp;#39;t go away in<br /> the middle of a lookup.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-37787

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered<br /> <br /> Russell King reports that a system with mv88e6xxx dereferences a NULL<br /> pointer when unbinding this driver:<br /> https://lore.kernel.org/netdev/Z_lRkMlTJ1KQ0kVX@shell.armlinux.org.uk/<br /> <br /> The crash seems to be in devlink_region_destroy(), which is not NULL<br /> tolerant but is given a NULL devlink global region pointer.<br /> <br /> At least on some chips, some devlink regions are conditionally registered<br /> since the blamed commit, see mv88e6xxx_setup_devlink_regions_global():<br /> <br /> if (cond &amp;&amp; !cond(chip))<br /> continue;<br /> <br /> These are MV88E6XXX_REGION_STU and MV88E6XXX_REGION_PVT. If the chip<br /> does not have an STU or PVT, it should crash like this.<br /> <br /> To fix the issue, avoid unregistering those regions which are NULL, i.e.<br /> were skipped at mv88e6xxx_setup_devlink_regions_global() time.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025