Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-0570

Publication date:
30/01/2025
Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.<br /> <br /> The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25304.
Severity CVSS v4.0: Pending analysis
Last modification:
19/02/2025

CVE-2025-0571

Publication date:
30/01/2025
Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.<br /> <br /> The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25305.
Severity CVSS v4.0: Pending analysis
Last modification:
19/02/2025

CVE-2025-24802

Publication date:
30/01/2025
Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. Lookup tables, whose length is not divisible by 26 = floor(num_routed_wires / 3) always include the 0 -&gt; 0 input-output pair. Thus a malicious prover can always prove that f(0) = 0 for any lookup table f (unless its length happens to be divisible by 26). The cause of problem is that the LookupTableGate-s are padded with zeros. A workaround from the user side is to extend the table (by repeating some entries) so that its length becomes divisible by 26. This vulnerability is fixed in 1.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-0147

Publication date:
30/01/2025
Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2025

CVE-2025-0143

Publication date:
30/01/2025
Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
31/07/2025

CVE-2025-0144

Publication date:
30/01/2025
Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2025

CVE-2025-0145

Publication date:
30/01/2025
Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
20/08/2025

CVE-2025-0146

Publication date:
30/01/2025
Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2025

CVE-2024-10604

Publication date:
30/01/2025
Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
Severity CVSS v4.0: MEDIUM
Last modification:
29/07/2025

CVE-2025-0142

Publication date:
30/01/2025
Cleartext storage of sensitive information in the Zoom Jenkins Marketplace plugin before version 1.4 may allow an authenticated user to conduct a disclosure of information via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-10026

Publication date:
30/01/2025
A weak hashing algorithm and small sizes of seeds/secrets in Google&amp;#39;s gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
Severity CVSS v4.0: MEDIUM
Last modification:
31/07/2025

CVE-2024-10603

Publication date:
30/01/2025
Weaknesses in the generation of TCP/UDP source ports and some other header values in Google&amp;#39;s gVisor allowed them to be predicted by an external attacker in some circumstances.
Severity CVSS v4.0: MEDIUM
Last modification:
29/07/2025