Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-20373

Publication date:
26/11/2025
In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-2486

Publication date:
26/11/2025
The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.
Severity CVSS v4.0: LOW
Last modification:
26/11/2025

CVE-2025-55469

Publication date:
26/11/2025
Incorrect access control in youlai-boot v2.21.1 allows attackers to escalate privileges and access the Administrator backend.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-55471

Publication date:
26/11/2025
Incorrect access control in the getUserFormData function of youlai-boot v2.21.1 allows attackers to access sensitive information for other users.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-13084

Publication date:
26/11/2025
The users endpoint in the groov View API returns a list of all users and<br /> associated metadata including their API keys. This endpoint requires an<br /> Editor role to access and will display API keys for all users, <br /> including Administrators.
Severity CVSS v4.0: MEDIUM
Last modification:
26/11/2025

CVE-2025-11461

Publication date:
26/11/2025
Multiple SQL Injections in Frappe CRM Dashboard Controller due to unsafe concatenation of user-controlled parameters into dynamic SQL statements.<br /> This issue affects Frappe CRM: 1.53.1.
Severity CVSS v4.0: HIGH
Last modification:
26/11/2025

CVE-2025-65236

Publication date:
26/11/2025
OpenCode Systems USSD Gateway OC Release: 5 was discovered to contain a SQL injection vulnerability via the Session ID parameter in the /occontrolpanel/index.php endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-65237

Publication date:
26/11/2025
A reflected cross-site scripted (XSS) vulnerability in OpenCode Systems USSD Gateway OC Release: 5 allows attackers to execute arbitrary JavaScript in the context of a user&amp;#39;s browser via injecting a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-65238

Publication date:
26/11/2025
Incorrect access control in the getSubUsersByProvider function of OpenCode Systems USSD Gateway OC Release: 5 Version 6.13.11 allows attackers with low-level privileges to dump user records and access sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-65239

Publication date:
26/11/2025
Incorrect access control in the /aux1/ocussd/trace endpoint of OpenCode Systems USSD Gateway OC Release:5, version 6.13.11 allows attackers with low-level privileges to read server logs.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-63938

Publication date:
26/11/2025
Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-65235

Publication date:
26/11/2025
OpenCode Systems USSD Gateway OC Release: 5 Version 6.13.11 was discovered to contain a SQL injection vulnerability via the ID parameter in the getSubUsersByProvider function.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025