Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-64983

Publication date:
26/11/2025
Smart Video Doorbell firmware versions prior to 2.01.078 contain an active debug code vulnerability that allows an attacker to connect via Telnet and gain access to the device.
Severity CVSS v4.0: HIGH
Last modification:
26/11/2025

CVE-2025-66229

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66230

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66231

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66232

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66233

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66234

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66235

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66228

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66025

Publication date:
26/11/2025
Caido is a web security auditing toolkit. Prior to version 0.53.0, the Markdown renderer used in Caido’s Findings page improperly handled user-supplied Markdown, allowing attacker-controlled links to be rendered without confirmation. When a user opened a finding generated through the scanner, or other plugins, clicking these injected links could redirect the Caido application to an attacker-controlled domain, enabling phishing style attacks. This issue has been patched in version 0.53.0.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66026

Publication date:
26/11/2025
REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version 5.20.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66022

Publication date:
26/11/2025
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025