Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-70893

Publication date:
15/01/2026
A time-based blind SQL Injection vulnerability exists in PHPGurukul Cyber Cafe Management System v1.0 within the adminprofile.php endpoint. The application fails to properly sanitize user-supplied input provided via the adminname parameter, allowing authenticated attackers to inject arbitrary SQL expressions.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-1002

Publication date:
15/01/2026
The Vert.x Web static handler component cache can be manipulated to deny the access to static files served by the handler using specifically crafted request URI.<br /> <br /> <br /> The issue comes from an improper implementation of the C. rule of section 5.2.4 of RFC3986 and is fixed in Vert.x Core component (used by Vert.x Web): https://github.com/eclipse-vertx/vert.x/pull/5895 <br /> <br /> <br /> <br /> Steps to reproduce<br /> Given a file served by the static handler, craft an URI that introduces a string like bar%2F..%2F after the last / char to deny the access to the URI with an HTTP 404 response. For example https://example.com/foo/index.html can be denied with https://example.com/foo/bar%2F..%2Findex.html<br /> <br /> Mitgation<br /> Disabling Static Handler cache fixes the issue.<br /> <br /> <br /> <br /> StaticHandler staticHandler = StaticHandler.create().setCachingEnabled(false);
Severity CVSS v4.0: MEDIUM
Last modification:
15/01/2026

CVE-2025-65368

Publication date:
15/01/2026
SparkyFitness v0.15.8.2 is vulnerable to Cross Site Scripting (XSS) via user input and LLM output.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2025-70890

Publication date:
15/01/2026
A stored cross-site scripting (XSS) vulnerability exists in Cyber Cafe Management System v1.0. An authenticated attacker can inject arbitrary JavaScript code into the username parameter via the add-users.php endpoint. The injected payload is stored and executed in the victim s browser when the affected page is accessed.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2025-67025

Publication date:
15/01/2026
Cross Site Scripting vulnerability in Anycomment anycomment.io 0.4.4 allows a remote attacker to execute arbitrary code via the Anycomment comment section
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2025-70891

Publication date:
15/01/2026
A stored cross-site scripting (XSS) vulnerability exists in Phpgurukul Cyber Cafe Management System v1.0 within the user management module. The application does not properly sanitize or encode user-supplied input submitted via the uadd parameter in the add-users.php endpoint. An authenticated attacker can inject arbitrary JavaScript code that is persistently stored in the database. The malicious payload is triggered when a privileged user clicks the View button on the view-allusers.php page.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2025-59959

Publication date:
15/01/2026
An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS).<br /> <br /> When the command &amp;#39;show route detail&amp;#39; is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart.<br /> &amp;#39;show route ... extensive&amp;#39; is not affected.<br /> <br /> <br /> <br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> <br /> <br /> * all versions before 22.4R3-S8,<br /> * 23.2 versions before 23.2R2-S5,<br /> * 23.4 versions before 23.4R2-S5,<br /> * 24.2 versions before 24.2R2-S2,<br /> * 24.4 versions before 24.4R2;<br /> <br /> <br /> <br /> <br /> Junos OS Evolved:<br /> <br /> <br /> <br /> * all versions before 22.4R3-S8-EVO, <br /> * 23.2 versions before 23.2R2-S5-EVO,<br /> * 23.4 versions before 23.4R2-S6-EVO,<br /> * 24.2 versions before 24.2R2-S2-EVO,<br /> * 24.4 versions before 24.4R2-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
15/01/2026

CVE-2025-59960

Publication date:
15/01/2026
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to a Denial of Service (DoS) on the downstream DHCP server.<br /> <br /> <br /> <br /> By default, the DHCP relay agent inserts its own Option 82 information when forwarding client requests, optionally replacing any Option 82 information provided by the client. When a specific DHCP DISCOVER is received in &amp;#39;forward-only&amp;#39; mode with Option 82, the device should drop the message unless &amp;#39;trust-option82&amp;#39; is configured. Instead, the DHCP relay forwards these packets to the DHCP server unmodified, which uses up addresses in the DHCP server&amp;#39;s address pool, ultimately leading to address pool exhaustion.<br /> <br /> This issue affects Junos OS: <br /> <br /> <br /> <br /> * all versions before 21.2R3-S10,<br /> * from 21.4 before 21.4R3-S12,<br /> * all versions of 22.2,<br /> * from 22.4 before 22.4R3-S8, <br /> * from 23.2 before 23.2R2-S5, <br /> * from 23.4 before 23.4R2-S6, <br /> * from 24.2 before 24.2R2-S2, <br /> * from 24.4 before 24.4R2, <br /> * from 25.2 before 25.2R1-S1, 25.2R2.<br /> <br /> <br /> <br /> <br /> Junos OS Evolved:<br /> <br /> <br /> <br /> * all versions before 21.4R3-S12-EVO, <br /> * all versions of 22.2-EVO,<br /> * from 22.4 before 22.4R3-S8-EVO, <br /> * from 23.2 before 23.2R2-S5-EVO, <br /> * from 23.4 before 23.4R2-S6-EVO, <br /> * from 24.2 before 24.2R2-S2-EVO, <br /> * from 24.4 before 24.4R2-EVO, <br /> * from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
15/01/2026

CVE-2025-59961

Publication date:
15/01/2026
An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd process, resulting in complete control over the resource.<br /> <br /> This vulnerability allows any low-privileged user logged into the system to connect to the Unix socket and issue commands to manage the DHCP service, in essence, taking administrative control of the local DHCP server or DHCP relay.<br /> <br /> This issue affects:<br /> Junos OS: <br /> * all versions before 21.2R3-S10,<br /> * all versions of 22.2,<br /> * from 21.4 before 21.4R3-S12,<br /> * from 22.4 before 22.4R3-S8,<br /> * from 23.2 before 23.2R2-S5, <br /> * from 23.4 before 23.4R2-S6, <br /> * from 24.2 before 24.2R2-S2, <br /> * from 24.4 before 24.4R2, <br /> * from 25.2 before 25.2R1-S1, 25.2R2; <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> * all versions before 22.4R3-S8-EVO, <br /> * from 23.2 before 23.2R2-S5-EVO, <br /> * from 23.4 before 23.4R2-S6-EVO, <br /> * from 24.2 before 24.2R2-S2-EVO, <br /> * from 24.4 before 24.4R2-EVO, <br /> * from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
15/01/2026

CVE-2025-60003

Publication date:
15/01/2026
A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer.<br /> This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring:<br /> <br /> [ protocols bgp ... disable-4byte-as ]<br /> <br /> <br /> Established BGP sessions can be checked by executing:<br /> <br /> show bgp neighbor | match "4 byte AS"<br /> <br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> * all versions before 22.4R3-S8,<br /> * 23.2 versions before 23.2R2-S5,<br /> * 23.4 versions before 23.4R2-S6,<br /> * 24.2 versions before 24.2R2-S2,<br /> * 24.4 versions before 24.4R2;<br /> <br /> <br /> Junos OS Evolved: <br /> <br /> * all versions before 22.4R3-S8-EVO,<br /> * 23.2 versions before 23.2R2-S5-EVO,<br /> * 23.4 versions before 23.4R2-S6-EVO,<br /> * 24.2 versions before 24.2R2-S2-EVO,<br /> * 24.4 versions before 24.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
15/01/2026

CVE-2025-60007

Publication date:
15/01/2026
A NULL Pointer Dereference vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS on MX, SRX and EX Series allows a local attacker with low privileges to cause a Denial-of-Service (DoS).<br /> <br /> <br /> When a user executes the &amp;#39;show chassis&amp;#39; command with specifically crafted options, chassisd will crash and restart. Due to this all components but the Routing Engine (RE) in the chassis are reinitialized, which leads to a complete service outage, which the system automatically recovers from.<br /> <br /> <br /> <br /> This issue affects:<br /> <br /> Junos OS on MX, SRX and EX Series: <br /> <br /> <br /> <br /> * all versions before 22.4R3-S8,<br /> * 23.2 versions before 23.2R2-S5,<br /> * 23.4 versions before 23.4R2-S6,<br /> * 24.2 versions before 24.2R2-S2,<br /> * 24.4 versions before 24.4R2.
Severity CVSS v4.0: MEDIUM
Last modification:
15/01/2026

CVE-2025-60011

Publication date:
15/01/2026
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an availability impact for downstream devices.<br /> <br /> When an affected device receives a specific optional, transitive BGP attribute over an existing BGP session, it will be erroneously modified before propagation to peers. When the attribute is detected as malformed by the peers, these peers will most likely terminate the BGP sessions with the affected devices and thereby cause an availability impact due to the resulting routing churn.<br /> <br /> This issue affects:<br /> <br /> Junos OS:<br /> <br /> <br /> <br /> * all versions before 22.4R3-S8,<br /> * 23.2 versions before 23.2R2-S5<br /> * 23.4 versions before 23.4R2-S6,<br /> * 24.2 versions before 24.2R2-S2,<br /> * 24.4 versions before 24.4R2;<br /> <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> <br /> <br /> <br /> * all versions before 22.4R3-S8-EVO,<br /> * 23.2 versions before 23.2R2-S5-EVO,<br /> * 23.4 versions before 23.4R2-S6-EVO,<br /> * 24.2 versions before 24.2R2-S2-EVO,<br /> * 24.4 versions before 24.4R2-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
15/01/2026