Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-60553

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard52.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-60548

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLanSetupRouterSettings.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-12176

Publication date:
24/10/2025
Undocumented administrative accounts were getting created to facilitate access for applications running on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: CRITICAL
Last modification:
24/10/2025

CVE-2025-8536

Publication date:
24/10/2025
A SQL injection vulnerability has been identified in DobryCMS. Improper neutralization of input provided by user into language functionality allows for SQL Injection attacks.<br /> <br /> This issue affects older branches of this software.
Severity CVSS v4.0: CRITICAL
Last modification:
24/10/2025

CVE-2025-60938

Publication date:
24/10/2025
Emoncms 11.7.3 has a remote code execution vulnerability in the firmware upload feature that allows authenticated users to execute arbitrary commands on the target system. The vulnerability stems from insufficient input validation of user-controlled parameters including filename, port, baud_rate, core, and autoreset within the /admin/upload-custom-firmware endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-60570

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLogDnsquery.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-60571

Publication date:
24/10/2025
D-Link DIR600LAx FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetQoS.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-60572

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvNetwork.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-60936

Publication date:
24/10/2025
Emoncms 11.7.3 is vulnerable to Cross Site in the input handling mechanism. This vulnerability allows authenticated attackers with API access to inject malicious JavaScript code that executes when administrators view the application logs.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-61430

Publication date:
24/10/2025
Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-56438

Publication date:
24/10/2025
An issue in the firmware update mechanism of Nous W3 Smart WiFi Camera v1.33.50.82 allows unauthenticated and physically proximate attackers to escalate privileges to root via supplying a crafted update.tar archive file stored on a FAT32-formatted SD card.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-60568

Publication date:
24/10/2025
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvFirewall.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025