Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-26269

Publication date:
17/04/2025
DragonflyDB Dragonfly through 1.28.2 (fixed in 1.29.0) allows authenticated users to cause a denial of service (daemon crash) via a Lua library command that references a large negative integer.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2025

CVE-2025-28009

Publication date:
17/04/2025
A SQL Injection vulnerability exists in the `u` parameter of the progress-body-weight.php endpoint of Dietiqa App v1.0.20.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2025-28101

Publication date:
17/04/2025
An arbitrary file deletion vulnerability in the /post/{postTitle} component of flaskBlog v2.6.1 allows attackers to delete article titles created by other users via supplying a crafted POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2025-29722

Publication date:
17/04/2025
A CSRF vulnerability in Commercify v1.0 allows remote attackers to perform unauthorized actions on behalf of authenticated users. The issue exists due to missing CSRF protection on sensitive endpoints.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2025-25454

Publication date:
17/04/2025
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanSpeed2.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2025-25455

Publication date:
17/04/2025
Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanMTU2.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2025-26268

Publication date:
17/04/2025
DragonflyDB Dragonfly before 1.27.0 allows authenticated users to cause a denial of service (daemon crash) via a crafted Redis command. The validity of the scan cursor was not checked.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2024-53924

Publication date:
17/04/2025
Pycel through 1.0b30, when operating on an untrusted spreadsheet, allows code execution via a crafted formula in a cell, such as one beginning with the =IF(A1=200, eval("__import__('os').system( substring.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2025

CVE-2024-55211

Publication date:
17/04/2025
An issue in Think Router Tk-Rt-Wr135G V3.0.2-X000 allows attackers to bypass authentication via a crafted cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2021-47668

Publication date:
17/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: dev: can_restart: fix use after free bug<br /> <br /> After calling netif_rx_ni(skb), dereferencing skb is unsafe.<br /> Especially, the can_frame cf which aliases skb memory is accessed<br /> after the netif_rx_ni() in:<br /> stats-&gt;rx_bytes += cf-&gt;len;<br /> <br /> Reordering the lines solves the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2021-47669

Publication date:
17/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: vxcan: vxcan_xmit: fix use after free bug<br /> <br /> After calling netif_rx_ni(skb), dereferencing skb is unsafe.<br /> Especially, the canfd_frame cfd which aliases skb memory is accessed<br /> after the netif_rx_ni().
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2021-47670

Publication date:
17/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: peak_usb: fix use after free bugs<br /> <br /> After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe.<br /> Especially, the can_frame cf which aliases skb memory is accessed<br /> after the peak_usb_netif_rx_ni().<br /> <br /> Reordering the lines solves the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025