Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-7493

Publication date:
30/09/2025
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-57852

Publication date:
30/09/2025
A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-56301

Publication date:
30/09/2025
An issue was discovered in Chipsalliance Rocket-Chip commit f517abbf41abb65cea37421d3559f9739efd00a9 (2025-01-29) allowing attackers to corrupt exception handling and privilege state transitions via a flawed interaction between exception handling and MRET return mechanisms in the CSR logic when an exception is triggered during MRET execution. The Control and Status Register (CSR) logic has a flawed interaction between exception handling and exception return (MRET) mechanisms which can cause faulty trap behavior. When the MRET instruction is executed in machine mode without being in an exception state, an Instruction Access Fault may be triggered. This results in both the exception handling logic and the exception return logic activating simultaneously, leading to conflicting updates to the control and status registers.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2025

CVE-2025-28016

Publication date:
30/09/2025
A Reflected Cross-Site Scripting (XSS) vulnerability was found in loginsystem/edit-profile.php of the PHPGurukul User Registration & Login and User Management System V3.3. This vulnerability allows remote attackers to execute arbitrary JavaScript code via the fname, lname, and contact parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2025

CVE-2025-11178

Publication date:
30/09/2025
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025

CVE-2025-9230

Publication date:
30/09/2025
Issue summary: An application trying to decrypt CMS messages encrypted using<br /> password based encryption can trigger an out-of-bounds read and write.<br /> <br /> Impact summary: This out-of-bounds read may trigger a crash which leads to<br /> Denial of Service for an application. The out-of-bounds write can cause<br /> a memory corruption which can have various consequences including<br /> a Denial of Service or Execution of attacker-supplied code.<br /> <br /> Although the consequences of a successful exploit of this vulnerability<br /> could be severe, the probability that the attacker would be able to<br /> perform it is low. Besides, password based (PWRI) encryption support in CMS<br /> messages is very rarely used. For that reason the issue was assessed as<br /> Moderate severity according to our Security Policy.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as the CMS implementation is outside the OpenSSL FIPS module<br /> boundary.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-9231

Publication date:
30/09/2025
Issue summary: A timing side-channel which could potentially allow remote<br /> recovery of the private key exists in the SM2 algorithm implementation on 64 bit<br /> ARM platforms.<br /> <br /> Impact summary: A timing side-channel in SM2 signature computations on 64 bit<br /> ARM platforms could allow recovering the private key by an attacker..<br /> <br /> While remote key recovery over a network was not attempted by the reporter,<br /> timing measurements revealed a timing signal which may allow such an attack.<br /> <br /> OpenSSL does not directly support certificates with SM2 keys in TLS, and so<br /> this CVE is not relevant in most TLS contexts. However, given that it is<br /> possible to add support for such certificates via a custom provider, coupled<br /> with the fact that in such a custom provider context the private key may be<br /> recoverable via remote timing measurements, we consider this to be a Moderate<br /> severity issue.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as SM2 is not an approved algorithm.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-9232

Publication date:
30/09/2025
Issue summary: An application using the OpenSSL HTTP client API functions may<br /> trigger an out-of-bounds read if the &amp;#39;no_proxy&amp;#39; environment variable is set and<br /> the host portion of the authority component of the HTTP URL is an IPv6 address.<br /> <br /> Impact summary: An out-of-bounds read can trigger a crash which leads to<br /> Denial of Service for an application.<br /> <br /> The OpenSSL HTTP client API functions can be used directly by applications<br /> but they are also used by the OCSP client functions and CMP (Certificate<br /> Management Protocol) client implementation in OpenSSL. However the URLs used<br /> by these implementations are unlikely to be controlled by an attacker.<br /> <br /> In this vulnerable code the out of bounds read can only trigger a crash.<br /> Furthermore the vulnerability requires an attacker-controlled URL to be<br /> passed from an application to the OpenSSL function and the user has to have<br /> a &amp;#39;no_proxy&amp;#39; environment variable set. For the aforementioned reasons the<br /> issue was assessed as Low severity.<br /> <br /> The vulnerable code was introduced in the following patch releases:<br /> 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as the HTTP client implementation is outside the OpenSSL FIPS module<br /> boundary.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-52043

Publication date:
30/09/2025
In Frappe ERPNext v15.57.5, the function import_coa() at erpnext/accounts/doctype/chart_of_accounts_importer/chart_of_accounts_importer.py is vulnerable to SQL injection, which allows an attacker to extract all information from databases by injecting a SQL query into the company parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-52047

Publication date:
30/09/2025
In Frappe ErpNext v15.57.5, the function get_income_account() at erpnext/controllers/queries.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the filters.disabled parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-52049

Publication date:
30/09/2025
In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-52050

Publication date:
30/09/2025
In Frappe ERPNext 15.57.5, the function get_loyalty_program_details_with_points() at erpnext/accounts/doctype/loyalty_program/loyalty_program.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the expiry_date parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025