Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-25128

Publication date:
24/12/2025
SOCA Access Control System 180612 contains multiple SQL injection vulnerabilities that allow attackers to manipulate database queries through unvalidated POST parameters. Attackers can bypass authentication, retrieve password hashes, and gain administrative access with full system privileges by exploiting injection flaws in Login.php and Card_Edit_GetJson.php.
Severity CVSS v4.0: CRITICAL
Last modification:
24/12/2025

CVE-2018-25129

Publication date:
24/12/2025
SOCA Access Control System 180612 contains multiple insecure direct object reference vulnerabilities that allow attackers to access sensitive user credentials. Attackers can retrieve authenticated and unauthenticated user password hashes and pins through unprotected endpoints like Get_Permissions_From_DB.php and Ac10_ReadSortCard.
Severity CVSS v4.0: HIGH
Last modification:
24/12/2025

CVE-2018-25130

Publication date:
24/12/2025
Beward Intercom 2.3.1 contains a credentials disclosure vulnerability that allows local attackers to access plain-text authentication credentials stored in an unencrypted database file. Attackers can read the BEWARD.INTERCOM.FDB file to extract usernames and passwords, enabling unauthorized access to IP cameras and door stations.
Severity CVSS v4.0: MEDIUM
Last modification:
24/12/2025

CVE-2018-25131

Publication date:
24/12/2025
Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 contains a stored cross-site scripting vulnerability in the configuration file upload functionality. Attackers can upload a malicious HTML file to that executes arbitrary JavaScript in a user's browser session when viewed.
Severity CVSS v4.0: MEDIUM
Last modification:
24/12/2025

CVE-2025-36154

Publication date:
24/12/2025
IBM Concert 1.0.0 through 2.1.0 stores sensitive information in cleartext during recursive docker builds which could be obtained by a local user.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2025-2515

Publication date:
24/12/2025
A vulnerability was found in BlueChi, a multi-node systemd service controller used in RHIVOS. This flaw allows a user with root privileges on a managed node (qm) to create or override systemd service unit files that affect the host node. This issue can lead to privilege escalation, unauthorized service execution, and potential system compromise.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2025-43875

Publication date:
24/12/2025
Under certain circumstances a successful exploitation could result in access to the device.
Severity CVSS v4.0: HIGH
Last modification:
24/12/2025

CVE-2025-43876

Publication date:
24/12/2025
Under certain circumstances a successful exploitation could result in access to the device.
Severity CVSS v4.0: HIGH
Last modification:
24/12/2025

CVE-2025-68750

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: potential integer overflow in usbg_make_tpg()<br /> <br /> The variable tpgt in usbg_make_tpg() is defined as unsigned long and is<br /> assigned to tpgt-&gt;tport_tpgt, which is defined as u16. This may cause an<br /> integer overflow when tpgt is greater than USHRT_MAX (65535). I<br /> haven&amp;#39;t tried to trigger it myself, but it is possible to trigger it<br /> by calling usbg_make_tpg() with a large value for tpgt.<br /> <br /> I modified the type of tpgt to match tpgt-&gt;tport_tpgt and adjusted the<br /> relevant code accordingly.<br /> <br /> This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential<br /> memory corruption").
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2024-39037

Publication date:
24/12/2025
MyNET up to v26.08.316 was discovered to contain an Unauthenticated SQL Injection vulnerability via the intmenu parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2024-40317

Publication date:
24/12/2025
A reflected cross-site scripting (XSS) vulnerability in MyNET up to v26.08 allows attackers to execute arbitrary code in the context of a user&amp;#39;s browser via injecting a crafted payload into the parameter HTTP.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2024-35322

Publication date:
24/12/2025
MyNET up to v26.08 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the ficheiro parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025