Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-39282

Publication date:
15/01/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: wwan: t7xx: Fix FSM command timeout issue<br /> <br /> When driver processes the internal state change command, it use an<br /> asynchronous thread to process the command operation. If the main<br /> thread detects that the task has timed out, the asynchronous thread<br /> will panic when executing the completion notification because the<br /> main thread completion object has been released.<br /> <br /> BUG: unable to handle page fault for address: fffffffffffffff8<br /> PGD 1f283a067 P4D 1f283a067 PUD 1f283c067 PMD 0<br /> Oops: 0000 [#1] PREEMPT SMP NOPTI<br /> RIP: 0010:complete_all+0x3e/0xa0<br /> [...]<br /> Call Trace:<br /> <br /> ? __die_body+0x68/0xb0<br /> ? page_fault_oops+0x379/0x3e0<br /> ? exc_page_fault+0x69/0xa0<br /> ? asm_exc_page_fault+0x22/0x30<br /> ? complete_all+0x3e/0xa0<br /> fsm_main_thread+0xa3/0x9c0 [mtk_t7xx (HASH:1400 5)]<br /> ? __pfx_autoremove_wake_function+0x10/0x10<br /> kthread+0xd8/0x110<br /> ? __pfx_fsm_main_thread+0x10/0x10 [mtk_t7xx (HASH:1400 5)]<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork+0x38/0x50<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork_asm+0x1b/0x30<br /> <br /> [...]<br /> CR2: fffffffffffffff8<br /> ---[ end trace 0000000000000000 ]---<br /> <br /> Use the reference counter to ensure safe release as Sergey suggests:<br /> https://lore.kernel.org/all/da90f64c-260a-4329-87bf-1f9ff20a5951@gmail.com/
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-11029

Publication date:
15/01/2025
A flaw was found in the FreeIPA API audit, where it sends the whole FreeIPA command line to journalctl. As a consequence, during the FreeIPA installation process, it inadvertently leaks the administrative user credentials, including the administrator password, to the journal database. In the worst-case scenario, where the journal log is centralized, users with access to it can have improper access to the FreeIPA administrator credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-11848

Publication date:
15/01/2025
The NitroPack plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the &amp;#39;nitropack_dismiss_notice_forever&amp;#39; AJAX action in all versions up to, and including, 1.17.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options to a fixed value of &amp;#39;1&amp;#39; which can activate certain options (e.g., enable user registration) or modify certain options in a way that leads to a denial of service condition.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-11851

Publication date:
15/01/2025
The NitroPack plugin for WordPress is vulnerable to unauthorized arbitrary transient update due to a missing capability check on the nitropack_rml_notification function in all versions up to, and including, 1.17.0. This makes it possible for authenticated attackers, with subscriber access or higher, to update arbitrary transients. Note, that these transients can only be updated to integers and not arbitrary values.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-12593

Publication date:
15/01/2025
The PDF for WPForms + Drag and Drop Template Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s yeepdf_dotab shortcode in all versions up to, and including, 4.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-0441

Publication date:
15/01/2025
Inappropriate implementation in Fenced Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to obtain potentially sensitive information from the system via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2025-0442

Publication date:
15/01/2025
Inappropriate implementation in Payments in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2025-0443

Publication date:
15/01/2025
Insufficient data validation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2025-0446

Publication date:
15/01/2025
Inappropriate implementation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2025-0447

Publication date:
15/01/2025
Inappropriate implementation in Navigation in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Low)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2025-0448

Publication date:
15/01/2025
Inappropriate implementation in Compositing in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2025-0439

Publication date:
15/01/2025
Race in Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025