Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-43017

Publication date:
28/10/2025
HP ThinPro 8.1 System management application failed to verify user's true id. HP has released HP ThinPro 8.1 SP8, which includes updates to mitigate potential vulnerabilities.
Severity CVSS v4.0: HIGH
Last modification:
30/10/2025

CVE-2025-59837

Publication date:
28/10/2025
Astro is a web framework that includes an image proxy. In versions 5.13.4 and later before 5.13.10, the image proxy domain validation can be bypassed by using backslashes in the href parameter, allowing server-side requests to arbitrary URLs. This can lead to server-side request forgery (SSRF) and potentially cross-site scripting (XSS). This vulnerability exists due to an incomplete fix for CVE-2025-58179. Fixed in 5.13.10.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-61235

Publication date:
28/10/2025
An issue was discovered in Dataphone A920 v2025.07.161103. A custom packet based on public documentation can be crafted, where some fields can contain arbitrary or trivial data. Normally, such data should cause the device to reject the packet. However, due to a lack of validation, the device accepts it with no authetication and triggers the functionality instead.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-62367

Publication date:
28/10/2025
Taiga is an open source project management platform. In versions 6.8.3 and earlier, Taiga API is vulnerable to time-based blind SQL injection allowing sensitive data disclosure via response timing. This issue is fixed in version 6.9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-27093

Publication date:
28/10/2025
Sliver is a command and control framework that uses a custom Wireguard netstack. In versions 1.5.43 and earlier, and in development version 1.6.0-dev, the netstack does not limit traffic between Wireguard clients. This allows clients to communicate with each other unrestrictedly, potentially enabling leaked or recovered keypairs to be used to attack operators or allowing port forwardings to be accessible from other implants.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-40843

Publication date:
28/10/2025
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. <br /> <br /> <br /> <br /> <br /> CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal ldlogger library, which is executed by the CodeChecker log command.<br /> <br /> <br /> <br /> <br /> <br /> This issue affects CodeChecker: through 6.26.1.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-12425

Publication date:
28/10/2025
Local Privilege Escalation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .
Severity CVSS v4.0: CRITICAL
Last modification:
07/11/2025

CVE-2025-12424

Publication date:
28/10/2025
Privilege Escalation through SUID-bit Binary.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .
Severity CVSS v4.0: CRITICAL
Last modification:
07/11/2025

CVE-2025-12423

Publication date:
28/10/2025
Protocol manipulation might lead to denial of service.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .
Severity CVSS v4.0: CRITICAL
Last modification:
07/11/2025

CVE-2025-60805

Publication date:
28/10/2025
An issue was discovered in BESSystem BES Application Server thru 9.5.x allowing unauthorized attackers to gain sensitive information via the "pre-resource" option in bes-web.xml.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-61080

Publication date:
28/10/2025
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Clear2Pay Bank Visibility Application - Payment Execution 1.10.0.104 via the ID parameter in the URL.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-60800

Publication date:
28/10/2025
Incorrect access control in the /jshERP-boot/user/info interface of jshERP up to commit 90c411a allows attackers to access sensitive information via a crafted GET request.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025