Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-11146

Publication date:
29/09/2025
Reflected Cross-site scripting (XSS) in Apt-Cacher-NG v3.2.1. The vulnerability allows an attacker to execute malicious scripts (XSS) in the web management application. The vulnerability is caused by improper handling of GET inputs included in the URL in “/acng-report.html”.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025

CVE-2025-10345

Publication date:
29/09/2025
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a <br /> stored HTML injection due to lack of proper validation of user input by <br /> sending a POST request in the parameters &amp;#39;name&amp;#39; and &amp;#39;address&amp;#39; at the endpoint &amp;#39;admin/leads/lead&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-10346

Publication date:
29/09/2025
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a <br /> stored HTML injection due to lack of proper validation of user input by <br /> sending a POST request in the parameters &amp;#39;subject&amp;#39; at the endpoint &amp;#39;knoewledge_base/article&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-10342

Publication date:
29/09/2025
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a <br /> stored HTML injection due to lack of proper validation of user input by <br /> sending a POST request in the parameter &amp;#39;name&amp;#39; at the endpoint &amp;#39;/subscriptions/create&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-10343

Publication date:
29/09/2025
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a <br /> stored HTML injection due to lack of proper validation of user input by <br /> sending a POST request in the parameter &amp;#39;expense_name&amp;#39; at the endpoint &amp;#39;/expenses/expense&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-10344

Publication date:
29/09/2025
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a <br /> stored HTML injection due to lack of proper validation of user input by <br /> sending a POST request in the parameters &amp;#39;name&amp;#39; and &amp;#39;clientid&amp;#39; at the endpoint &amp;#39;/projects/project/x&amp;#39;.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-10341

Publication date:
29/09/2025
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a <br /> stored HTML injection due to lack of proper validation of user input by <br /> sending a POST request in the parameter &amp;#39;company&amp;#39; at the endpoint &amp;#39;/clients/client/x.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2025-48006

Publication date:
29/09/2025
Improper restriction of XML external entity reference issue exists in DataSpider Servista 4.4 and earlier. If a specially crafted request is processed, arbitrary files on the file system where the server application for the product is installed may be read, or a denial-of-service (DoS) condition may occur.
Severity CVSS v4.0: HIGH
Last modification:
14/10/2025

CVE-2024-5200

Publication date:
29/09/2025
The Postie WordPress plugin before 1.9.71 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-11141

Publication date:
29/09/2025
A security flaw has been discovered in Ruijie NBR2100G-E up to 20250919. Affected by this issue is the function listAction of the file /itbox_pi/branch_passw.php?a=list. Performing manipulation of the argument city results in os command injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
29/09/2025

CVE-2025-10504

Publication date:
29/09/2025
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025

CVE-2025-11140

Publication date:
29/09/2025
A vulnerability was identified in Bjskzy Zhiyou ERP up to 11.0. Affected by this vulnerability is the function openForm of the component com.artery.richclient.RichClientService. Such manipulation of the argument contentString leads to xml external entity reference. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
03/10/2025