Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-28016

Publication date:
30/09/2025
A Reflected Cross-Site Scripting (XSS) vulnerability was found in loginsystem/edit-profile.php of the PHPGurukul User Registration & Login and User Management System V3.3. This vulnerability allows remote attackers to execute arbitrary JavaScript code via the fname, lname, and contact parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2025

CVE-2025-11178

Publication date:
30/09/2025
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025

CVE-2025-9230

Publication date:
30/09/2025
Issue summary: An application trying to decrypt CMS messages encrypted using<br /> password based encryption can trigger an out-of-bounds read and write.<br /> <br /> Impact summary: This out-of-bounds read may trigger a crash which leads to<br /> Denial of Service for an application. The out-of-bounds write can cause<br /> a memory corruption which can have various consequences including<br /> a Denial of Service or Execution of attacker-supplied code.<br /> <br /> Although the consequences of a successful exploit of this vulnerability<br /> could be severe, the probability that the attacker would be able to<br /> perform it is low. Besides, password based (PWRI) encryption support in CMS<br /> messages is very rarely used. For that reason the issue was assessed as<br /> Moderate severity according to our Security Policy.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as the CMS implementation is outside the OpenSSL FIPS module<br /> boundary.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-9231

Publication date:
30/09/2025
Issue summary: A timing side-channel which could potentially allow remote<br /> recovery of the private key exists in the SM2 algorithm implementation on 64 bit<br /> ARM platforms.<br /> <br /> Impact summary: A timing side-channel in SM2 signature computations on 64 bit<br /> ARM platforms could allow recovering the private key by an attacker..<br /> <br /> While remote key recovery over a network was not attempted by the reporter,<br /> timing measurements revealed a timing signal which may allow such an attack.<br /> <br /> OpenSSL does not directly support certificates with SM2 keys in TLS, and so<br /> this CVE is not relevant in most TLS contexts. However, given that it is<br /> possible to add support for such certificates via a custom provider, coupled<br /> with the fact that in such a custom provider context the private key may be<br /> recoverable via remote timing measurements, we consider this to be a Moderate<br /> severity issue.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as SM2 is not an approved algorithm.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-9232

Publication date:
30/09/2025
Issue summary: An application using the OpenSSL HTTP client API functions may<br /> trigger an out-of-bounds read if the &amp;#39;no_proxy&amp;#39; environment variable is set and<br /> the host portion of the authority component of the HTTP URL is an IPv6 address.<br /> <br /> Impact summary: An out-of-bounds read can trigger a crash which leads to<br /> Denial of Service for an application.<br /> <br /> The OpenSSL HTTP client API functions can be used directly by applications<br /> but they are also used by the OCSP client functions and CMP (Certificate<br /> Management Protocol) client implementation in OpenSSL. However the URLs used<br /> by these implementations are unlikely to be controlled by an attacker.<br /> <br /> In this vulnerable code the out of bounds read can only trigger a crash.<br /> Furthermore the vulnerability requires an attacker-controlled URL to be<br /> passed from an application to the OpenSSL function and the user has to have<br /> a &amp;#39;no_proxy&amp;#39; environment variable set. For the aforementioned reasons the<br /> issue was assessed as Low severity.<br /> <br /> The vulnerable code was introduced in the following patch releases:<br /> 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as the HTTP client implementation is outside the OpenSSL FIPS module<br /> boundary.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-52043

Publication date:
30/09/2025
In Frappe ERPNext v15.57.5, the function import_coa() at erpnext/accounts/doctype/chart_of_accounts_importer/chart_of_accounts_importer.py is vulnerable to SQL injection, which allows an attacker to extract all information from databases by injecting a SQL query into the company parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-52047

Publication date:
30/09/2025
In Frappe ErpNext v15.57.5, the function get_income_account() at erpnext/controllers/queries.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the filters.disabled parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-52049

Publication date:
30/09/2025
In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-52050

Publication date:
30/09/2025
In Frappe ERPNext 15.57.5, the function get_loyalty_program_details_with_points() at erpnext/accounts/doctype/loyalty_program/loyalty_program.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the expiry_date parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-34217

Publication date:
30/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) contain an undocumented &amp;#39;printerlogic&amp;#39; user with a hardcoded SSH public key in &amp;#39;~/.ssh/authorized_keys&amp;#39; and a sudoers rule granting the printerlogic_ssh group &amp;#39;NOPASSWD: ALL&amp;#39;. Possession of the matching private key gives an attacker root access to the appliance.
Severity CVSS v4.0: CRITICAL
Last modification:
07/10/2025

CVE-2025-11152

Publication date:
30/09/2025
Sandbox escape due to integer overflow in the Graphics: Canvas2D component. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-10217

Publication date:
30/09/2025
A vulnerability exists in Asset Suite for an authenticated user to manipulate the content of performance related log data or to inject crafted data in logfile for potentially carrying out further malicious attacks. Performance logging is typically enabled for troubleshooting purposes while resolving application performance related issues.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025