Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-24801

Publication date:
18/03/2025
GLPI is a free asset and IT management software package. An authenticated user can upload and force the execution of *.php files located on the GLPI server. This vulnerability is fixed in 10.0.18.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-25040

Publication date:
18/03/2025
A vulnerability has been identified in the port ACL functionality of AOS-CX software running on the HPE Aruba Networking CX 9300 Switch Series only and affects: <br /> <br /> - AOS-CX 10.14.xxxx : All patches<br /> - AOS-CX 10.15.xxxx : 10.15.1000 and below <br /> The vulnerability is specific to traffic originated by the CX 9300 switch platform and could allow an attacker to bypass ACL rules applied to routed ports on egress. As a result, port ACLs are not correctly enforced, which could lead to unauthorized traffic flow and violations of security policies. Egress VLAN ACLs and Routed VLAN ACLs are not affected by this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-25042

Publication date:
18/03/2025
A vulnerability in the AOS-CX REST interface could allow an authenticated remote attacker with low privileges to view sensitive information. Successful exploitation could allow an attacker to read encrypted credentials of other users on the switch, potentially leading to further unauthorized access or data breaches.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-24799

Publication date:
18/03/2025
GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 10.0.18.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-21619

Publication date:
18/03/2025
GLPI is a free asset and IT management software package. An administrator user can perfom a SQL injection through the rules configuration forms. This vulnerability is fixed in 10.0.18.
Severity CVSS v4.0: HIGH
Last modification:
18/03/2025

CVE-2025-2487

Publication date:
18/03/2025
A flaw was found in the 389-ds-base LDAP Server. This issue occurs when issuing a Modify DN LDAP operation through the ldap protocol, when the function return value is not tested and a NULL pointer is dereferenced. If a privileged user performs a ldap MODDN operation after a failed operation, it could lead to a Denial of Service (DoS) or system crash.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-25595

Publication date:
18/03/2025
A lack of rate limiting in the login page of Safe App version a3.0.9 allows attackers to bypass authentication via a brute force attack.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-26137

Publication date:
18/03/2025
Systemic Risk Value
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-26138

Publication date:
18/03/2025
Systemic Risk Value
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-56346

Publication date:
18/03/2025
IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to execute arbitrary commands due to improper process controls.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-56347

Publication date:
18/03/2025
IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-25586

Publication date:
18/03/2025
yimioa before v2024.07.04 was discovered to contain an information disclosure vulnerability via the component /resources/application.yml.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025