Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-4145

Publication date:
01/05/2025
A vulnerability, which was classified as critical, has been found in Netgear EX6200 1.0.3.94. This issue affects the function sub_3D0BC. The manipulation of the argument host leads to buffer overflow. The attack may be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
12/05/2025

CVE-2025-4144

Publication date:
01/05/2025
PKCE was implemented in the OAuth implementation in workers-oauth-provider that is part of MCP framework https://github.com/cloudflare/workers-mcp . However, it was found that an attacker could cause the check to be skipped.<br /> <br /> <br /> Fixed in:<br /> <br /> <br /> <br /> https://github.com/cloudflare/workers-oauth-provider/pull/27 https://github.com/cloudflare/workers-oauth-provider/pull/27 <br /> <br /> <br /> Impact: <br /> <br /> PKCE is a defense-in-depth mechanism against certain kinds of attacks and was an optional extension in OAuth 2.0 which became required in the OAuth 2.1 draft. (Note that the MCP specification requires OAuth 2.1.). This bug completely bypasses PKCE protection.
Severity CVSS v4.0: MEDIUM
Last modification:
12/05/2025

CVE-2025-4143

Publication date:
01/05/2025
The OAuth implementation in workers-oauth-provider that is part of MCP framework https://github.com/cloudflare/workers-mcp , did not correctly validate that redirect_uri was on the allowed list of redirect URIs for the given client registration.<br /> <br /> Fixed in:  https://github.com/cloudflare/workers-oauth-provider/pull/26 https://github.com/cloudflare/workers-oauth-provider/pull/26 <br /> <br /> Impact:<br /> <br /> <br /> <br /> Under certain circumstances (see below), if a victim had previously authorized with a server built on workers-oath-provider, and an attacker could later trick the victim into visiting a malicious web site, then attacker could potentially steal the victim&amp;#39;s credentials to the same OAuth server and subsequently impersonate them.<br /> <br /> In order for the attack to be possible, the OAuth server&amp;#39;s authorized callback must be designed to auto-approve authorizations that appear to come from an OAuth client that the victim has authorized previously. The authorization flow is not implemented by workers-oauth-provider; it is up to the application built on top to decide whether to implement such automatic re-authorization. However, many applications do implement such logic.<br /> <br /> Note: It is a basic, well-known requirement that OAuth servers should verify that the redirect URI is among the allowed list for the client, both during the authorization flow and subsequently when exchanging the authorization code for an access token. workers-oauth-provider implemented only the latter check, not the former. Unfortunately, the former is the much more important check. Readers who are familiar with OAuth may recognize that failing to check redirect URIs against the allowed list is a well-known, basic mistake, covered extensively in the RFC and elsewhere. The author of this library would like everyone to know that he was, in fact, well-aware of this requirement, thought about it a lot while designing the library, and then, somehow, forgot to actually make sure the check was in the code. That is, it&amp;#39;s not that he didn&amp;#39;t know what he was doing, it&amp;#39;s that he knew what he was doing but flubbed it.
Severity CVSS v4.0: MEDIUM
Last modification:
12/05/2025

CVE-2025-4142

Publication date:
30/04/2025
A vulnerability has been found in Netgear EX6200 1.0.3.94 and classified as critical. This vulnerability affects the function sub_3C8EC. The manipulation of the argument host leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
12/05/2025

CVE-2025-4141

Publication date:
30/04/2025
A vulnerability, which was classified as critical, was found in Netgear EX6200 1.0.3.94. This affects the function sub_3C03C. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
12/05/2025

CVE-2025-4140

Publication date:
30/04/2025
A vulnerability, which was classified as critical, has been found in Netgear EX6120 1.0.3.94. Affected by this issue is the function sub_30394. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
12/05/2025

CVE-2023-37535

Publication date:
30/04/2025
Insufficient URI protocol whitelist in HCL Domino Volt and Domino Leap<br /> allow script injection through query parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-45721

Publication date:
30/04/2025
Insufficient default configuration in HCL Leap<br /> allows anonymous access to directory information.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2024-30115

Publication date:
30/04/2025
Insufficient sanitization policy in HCL Leap<br /> allows client-side script injection in the deployed application through the<br /> HTML widget.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2024-30145

Publication date:
30/04/2025
Multiple vectors in HCL Domino Volt and Domino Leap allow client-side<br /> script injection in the authoring environment and deployed applications.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2024-30146

Publication date:
30/04/2025
Improper access control of endpoint in HCL Domino Leap<br /> allows certain admin users to import applications from the<br /> server&amp;#39;s filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2023-4533

Publication date:
30/04/2025
Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. It was assigned as a duplicate of CVE-2023-52440
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2025