Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-62169

Publication date:
23/10/2025
OctoPrint-SpoolManager is a plugin for managing spools and all their usage metadata. In versions 1.8.0a2 and older of the testing branch and versions 1.7.7 and older of the stable branch, the APIs of the OctoPrint-SpoolManager plugin do not correctly enforce authentication or authorization checks. This issue has been patched in versions 1.8.0a3 of the testing branch and 1.7.8 of the stable branch. The impact of this vulnerability is greatly reduced when using OctoPrint version 1.11.2 and newer.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2025-59048

Publication date:
23/10/2025
OpenBao's AWS Plugin generates AWS access credentials based on IAM policies. Prior to version 0.1.1, the AWS Plugin is vulnerable to cross-account IAM role Impersonation in the AWS auth method. The vulnerability allows an IAM role from an untrusted AWS account to authenticate by impersonating a role with the same name in a trusted account, leading to unauthorized access. This impacts all users of the auth-aws plugin who operate in a multi-account AWS environment where IAM role names may not be unique across accounts. This vulnerability has been patched in version 0.1.1 of the auth-aws plugin. A workaround for this issue involves guaranteeing that IAM role names are unique across all AWS accounts that could potentially interact with your OpenBao environment, and to audit for any duplicate IAM roles.
Severity CVSS v4.0: Pending analysis
Last modification:
05/12/2025

CVE-2025-50951

Publication date:
23/10/2025
FontForge v20230101 was discovered to contain a memory leak via the utf7toutf8_copy function at /fontforge/sfd.c.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2025-50950

Publication date:
23/10/2025
Audiofile v0.3.7 was discovered to contain a NULL pointer dereference via the ModuleState::setup function.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2025-50949

Publication date:
23/10/2025
FontForge v20230101 was discovered to contain a memory leak via the component DlgCreate8.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2025-12114

Publication date:
23/10/2025
Enabled serial console could potentially leak information that might help attacker to find vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: MEDIUM
Last modification:
10/11/2025

CVE-2025-61132

Publication date:
23/10/2025
A Host Header Injection vulnerability in the password reset component in levlaz braindump v0.4.14 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2025-61136

Publication date:
23/10/2025
A Host Header Injection vulnerability in the password reset component in axewater sharewarez v2.4.3 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2025-56009

Publication date:
23/10/2025
Cross site request forgery (CSRF) vulnerability in KeeneticOS before 4.3 at "/rci" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-56008

Publication date:
23/10/2025
Cross site scripting (XSS) vulnerability in KeeneticOS before 4.3 at "Wireless ISP" page allows attackers located near to the router to takeover the device via adding additional users with full permissions.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-56007

Publication date:
23/10/2025
CRLF-injection in KeeneticOS before 4.3 at "/auth" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-12110

Publication date:
23/10/2025
A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
Severity CVSS v4.0: Pending analysis
Last modification:
19/12/2025