Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-13066

Publication date:
03/09/2025
Improper Restriction of Rendered UI Layers or Frames vulnerability in Akinsoft LimonDesk allows iFrame Overlay, CAPEC - 103 - Clickjacking.This issue affects LimonDesk: from s1.02.14 before v1.02.17.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-41000

Publication date:
03/09/2025
Cross-Frame Scripting (XFS) vulnerability in BoomCMS v9.1.4 from UXB London. XFS is a web attack technique that exploits specific browser bugs to spy on users via JavaScript. This type of attack is based on social engineering and depends entirely on the browser chosen by the user, so it is perceived as a minor threat to web application security. This vulnerability only works in older browsers.
Severity CVSS v4.0: LOW
Last modification:
04/09/2025

CVE-2025-9821

Publication date:
03/09/2025
SummaryUsers with webhook permissions can conduct SSRF via webhooks. If they have permission to view the webhook logs, the (partial) request response is also disclosed<br /> <br /> DetailsWhen sending webhooks, the destination is not validated, causing SSRF.<br /> <br /> <br /> ImpactBypass of firewalls to interact with internal services.<br /> See https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/  for more potential impact.<br /> <br /> Resources https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html  for more information on SSRF and its fix.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2024-43166

Publication date:
03/09/2025
Incorrect Default Permissions vulnerability in Apache DolphinScheduler.<br /> <br /> This issue affects Apache DolphinScheduler: before 3.2.2.<br /> <br /> Users are recommended to upgrade to version 3.3.1, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2025

CVE-2025-1740

Publication date:
03/09/2025
Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft MyRezzta allows Authentication Bypass, Password Recovery Exploitation, Brute Force.This issue affects MyRezzta: from s2.03.01 before v2.05.01.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-2415

Publication date:
03/09/2025
Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft MyRezzta allows Authentication Bypass.This issue affects MyRezzta: from s2.03.01 before v2.05.01.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-9219

Publication date:
03/09/2025
The Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the &amp;#39;update_post_smtp_pro_option_callback&amp;#39; function in all versions up to, and including, 3.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable pro extensions.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2024-43115

Publication date:
03/09/2025
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can execute any shell script server by alert script.<br /> <br /> <br /> This issue affects Apache DolphinScheduler: before 3.2.2.<br /> <br /> Users are recommended to upgrade to version 3.3.1, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2025

CVE-2024-13063

Publication date:
03/09/2025
Authorization Bypass Through User-Controlled Key vulnerability in Akinsoft MyRezzta allows Forceful Browsing.This issue affects MyRezzta: from s2.02.02 before v2.05.01.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2024-13064

Publication date:
03/09/2025
Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Akinsoft MyRezzta allows Cross-Site Scripting (XSS).This issue affects MyRezzta: from s2.02.02 before v2.05.01.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2024-13065

Publication date:
03/09/2025
Improper Enforcement of Behavioral Workflow, Uncontrolled Resource Consumption vulnerability in Akinsoft MyRezzta allows Input Data Manipulation, CAPEC - 125 - Flooding.This issue affects MyRezzta: from s2.02.02 before v2.05.01.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2014-125127

Publication date:
03/09/2025
The mikecao/flight PHP framework in versions prior to v1.2 is vulnerable to Denial of Service (DoS) attacks due to eager loading of request bodies in the Request class constructor. The framework automatically reads the entire request body on every HTTP request, regardless of whether the application needs it. An attacker can exploit this by sending requests with large payloads, causing excessive memory consumption and potentially exhausting available server memory, leading to application crashes or service unavailability. The vulnerability was fixed in v1.2 by implementing lazy loading of request bodies.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025