Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-8733

Publication date:
08/08/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Additional analysis indicates that the files referenced in the stack trace do not exist in Bison.
Severity CVSS v4.0: MEDIUM
Last modification:
04/11/2025

CVE-2025-8734

Publication date:
08/08/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: Additional analysis indicates that the files referenced in the stack trace do not exist in Bison.
Severity CVSS v4.0: MEDIUM
Last modification:
04/11/2025

CVE-2025-52914

Publication date:
08/08/2025
A vulnerability in the Suite Applications Services component of Mitel MiCollab 10.0 through SP1 FP1 (10.0.1.101) could allow an authenticated attacker to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary SQL database commands.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-50928

Publication date:
08/08/2025
Easy Hosting Control Panel EHCP v20.04.1.b was discovered to contain a SQL injection vulnerability via the id parameter in the Change Settings function.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2025-52913

Publication date:
08/08/2025
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP2 (9.8.2.12) could allow an unauthenticated attacker to conduct a path traversal attack due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-5095

Publication date:
08/08/2025
Burk Technology ARC Solo&amp;#39;s password change mechanism can be utilized without proper <br /> authentication procedures, allowing an attacker to take over the device.<br /> A password change request can be sent directly to the device&amp;#39;s HTTP <br /> endpoint without providing valid credentials. The system does not <br /> enforce proper authentication or session validation, allowing the <br /> password change to proceed without verifying the request&amp;#39;s legitimacy.
Severity CVSS v4.0: CRITICAL
Last modification:
08/08/2025

CVE-2025-50927

Publication date:
08/08/2025
A reflected cross-site scripting (XSS) vulnerability in the List All FTP User Function in EHCP v20.04.1.b allows authenticated attackers to execute arbitrary JavaScript via injecting a crafted payload into the ftpusername parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2025

CVE-2025-8284

Publication date:
08/08/2025
By default, the Packet Power Monitoring and Control Web Interface do not<br /> enforce authentication mechanisms. This vulnerability could allow <br /> unauthorized users to access and manipulate monitoring and control <br /> functions.
Severity CVSS v4.0: CRITICAL
Last modification:
08/08/2025

CVE-2025-8393

Publication date:
08/08/2025
A TLS vulnerability exists in the phone application used to manage a <br /> connected device. The phone application accepts self-signed certificates<br /> when establishing TLS communication which may result in <br /> man-in-the-middle attacks on untrusted networks. Captured communications<br /> may include user credentials and sensitive session tokens.
Severity CVSS v4.0: HIGH
Last modification:
08/08/2025

CVE-2025-8732

Publication date:
08/08/2025
A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."
Severity CVSS v4.0: MEDIUM
Last modification:
08/08/2025

CVE-2025-50467

Publication date:
08/08/2025
OpenMetadata
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2025

CVE-2025-50468

Publication date:
08/08/2025
OpenMetadata
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2025