Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-27453

Publication date:
03/07/2025
The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27454

Publication date:
03/07/2025
The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27455

Publication date:
03/07/2025
The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27456

Publication date:
03/07/2025
The SMB server's login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27457

Publication date:
03/07/2025
All communication between the VNC server and client(s) is unencrypted. This allows an attacker to intercept the traffic and obtain sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27458

Publication date:
03/07/2025
The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-1710

Publication date:
03/07/2025
The maxView Storage Manager does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-1711

Publication date:
03/07/2025
Multiple services of the DUT as well as different scopes of the same service reuse the same credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27447

Publication date:
03/07/2025
The web application is susceptible to cross-site-scripting attacks. An attacker can create a prepared URL, which injects JavaScript code into the website. The code is executed in the victim’s browser when an authenticated administrator clicks the link.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27448

Publication date:
03/07/2025
The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboards can inject JavaScript code into the dashboard name which will be executed when the website is loaded.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27449

Publication date:
03/07/2025
The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27450

Publication date:
03/07/2025
The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025