Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-11327

Publication date:
06/10/2025
A security vulnerability has been detected in Tenda AC18 15.03.05.19(6318). This vulnerability affects unknown code of the file /goform/SetUpnpCfg. The manipulation of the argument upnpEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Severity CVSS v4.0: HIGH
Last modification:
07/10/2025

CVE-2025-11326

Publication date:
06/10/2025
A weakness has been identified in Tenda AC18 15.03.05.19(6318). This affects an unknown part of the file /goform/WifiMacFilterSet. Executing manipulation of the argument wifi_chkHz can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.
Severity CVSS v4.0: HIGH
Last modification:
07/10/2025

CVE-2025-58591

Publication date:
06/10/2025
A remote, unauthorized attacker can brute force folders and files and read them like private keys or configurations, making the application vulnerable for gathering sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-9913

Publication date:
06/10/2025
JavaScript can be ran inside the address bar via the dashboard "Open in new Tab" Button, making the application vulnerable to session hijacking.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2026

CVE-2025-9914

Publication date:
06/10/2025
The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2026

CVE-2025-58590

Publication date:
06/10/2025
It's possible to brute force folders and files, what can be used by an attacker to steal sensitve information.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58589

Publication date:
06/10/2025
When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker thus receives information about the technology used and the structure of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58587

Publication date:
06/10/2025
The application does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it possible for an attacker to guess user credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58586

Publication date:
06/10/2025
For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58585

Publication date:
06/10/2025
Multiple endpoints with sensitive information do not require authentication, making the application susceptible to information gathering.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58584

Publication date:
06/10/2025
In the HTTP request, the username and password are transferred directly in the URL as parameters. However, URLs can be stored in various systems such as server logs, browser histories or proxy servers. As a result, there is a high risk that this sensitive data will be disclosed unintentionally.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026

CVE-2025-58583

Publication date:
06/10/2025
The application provides access to a login protected H2 database for caching purposes. The username is prefilled.
Severity CVSS v4.0: Pending analysis
Last modification:
27/01/2026