Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-12553

Publication date:
31/10/2025
Email Server Certificate Verification Disabled.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: CRITICAL
Last modification:
31/10/2025

CVE-2025-12554

Publication date:
31/10/2025
Missing Security Headers.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: MEDIUM
Last modification:
31/10/2025

CVE-2025-63466

Publication date:
31/10/2025
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the password parameter in the sub_426EF8 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-63467

Publication date:
31/10/2025
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_425400 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-29270

Publication date:
31/10/2025
Incorrect access control in the realtime.cgi endpoint of Deep Sea Electronics devices DSE855 v1.1.0 to v1.1.26 allows attackers to gain access to the admin panel and complete control of the device.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-12507

Publication date:
31/10/2025
The service Bizerba Communication Server (BCS) has an unquoted service path. Due to the way Windows searches the executable for the BCS service, malicious programs can be executed.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-12508

Publication date:
31/10/2025
When using domain users as BRAIN2 users, communication with Active Directory services is unencrypted. This can lead to the interception of authentication data and compromise confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-12509

Publication date:
31/10/2025
On a client with an admin user, a Global_Shipping script can be implemented. The script could later be executed on the BRAIN2 server with administrator rights.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-12552

Publication date:
31/10/2025
Insufficient Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: MEDIUM
Last modification:
31/10/2025

CVE-2025-12357

Publication date:
31/10/2025
By manipulating the Signal Level Attenuation Characterization (SLAC) <br /> protocol with spoofed measurements, an attacker can stage a <br /> man-in-the-middle attack between an electric vehicle and chargers that <br /> comply with the ISO 15118-2 part. This vulnerability may be exploitable <br /> wirelessly, within close proximity, via electromagnetic induction.
Severity CVSS v4.0: HIGH
Last modification:
31/10/2025

CVE-2025-64389

Publication date:
31/10/2025
The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol.
Severity CVSS v4.0: HIGH
Last modification:
31/10/2025

CVE-2025-61427

Publication date:
31/10/2025
A reflected cross-site scripting (XSS) vulnerability in BEO GmbH BEO Atlas Einfuhr Ausfuhr 3.0 allows attackers to execute arbitrary code in the context of a user&amp;#39;s browser via injecting a crafted payload into the userid and password parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025