Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-52026

Publication date:
23/01/2026
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-52022

Publication date:
23/01/2026
A vulnerability in the PHP backend of gemsloyalty.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-67264

Publication date:
23/01/2026
An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete patching of CVE-2025-31710
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2026-21867

Publication date:
23/01/2026
Rejected reason: Reason: This candidate was issued in error.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-70986

Publication date:
23/01/2026
Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-70983

Publication date:
23/01/2026
Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-70985

Publication date:
23/01/2026
Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2025-14947

Publication date:
23/01/2026
The All-in-One Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `ajax_callback_create_bunny_stream_video`, `ajax_callback_get_bunny_stream_video`, and `ajax_callback_delete_bunny_stream_video` functions in all versions up to, and including, 4.6.4. This makes it possible for unauthenticated attackers to create and delete videos on the Bunny Stream CDN associated with the victim's account, provided they can obtain a valid nonce which is exposed in public player templates.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2026-24423

Publication date:
23/01/2026
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
Severity CVSS v4.0: CRITICAL
Last modification:
23/01/2026

CVE-2026-1299

Publication date:
23/01/2026
The <br /> email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when <br /> serializing an email message allowing for header injection when an email<br /> is serialized. This is only applicable if using "LiteralHeader" writing headers that don&amp;#39;t respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-71177

Publication date:
23/01/2026
LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rendered without proper output encoding in package search results. When other users view search results that include the malicious package, the injected script executes in their browsers, potentially enabling session hijacking, credential theft, and unauthorized actions in the context of the victim.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-67231

Publication date:
23/01/2026
A reflected cross-site scripting (XSS) vulnerability in ToDesktop Builder v0.33.1 allows attackers to execute arbitrary code in the context of a user&amp;#39;s browser via a crafted payload.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026