Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-36573

Publication date:
12/06/2025
Dell Smart Dock Firmware, versions prior to 01.00.08.01, contain an Insertion of Sensitive Information into Log File vulnerability. A user with local access could potentially exploit this vulnerability, leading to Information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-46035

Publication date:
12/06/2025
Buffer Overflow vulnerability in Tenda AC6 v.15.03.05.16 allows a remote attacker to cause a denial of service via the oversized schedStartTime and schedEndTime parameters in an unauthenticated HTTP GET request to the /goform/openSchedWifi endpoint
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-49467

Publication date:
12/06/2025
A SQL injection vulnerability in JEvents component before 3.6.88 and 3.6.82.1 for Joomla was discovered. The extension is vulnerable to SQL injection via publicly accessible actions to list events by date ranges.
Severity CVSS v4.0: CRITICAL
Last modification:
12/06/2025

CVE-2024-44905

Publication date:
12/06/2025
go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2024-44906

Publication date:
12/06/2025
uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2024-7562

Publication date:
12/06/2025
A potential elevated privilege issue has been reported with InstallShield built Standalone MSI setups having multiple InstallScript custom actions configured. All supported versions (InstallShield 2023 R2, InstallShield 2022 R2 and InstallShield 2021 R2) are affected by this issue.
Severity CVSS v4.0: HIGH
Last modification:
12/06/2025

CVE-2025-29744

Publication date:
12/06/2025
pg-promise before 11.5.5 is vulnerable to SQL Injection due to improper handling of negative numbers.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-49198

Publication date:
12/06/2025
The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-49199

Publication date:
12/06/2025
The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-49200

Publication date:
12/06/2025
The created backup files are unencrypted, making the application vulnerable for gathering sensitive information by downloading and decompressing the backup files.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-49192

Publication date:
12/06/2025
The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-49193

Publication date:
12/06/2025
The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025