Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-27461

Publication date:
03/07/2025
During startup, the device automatically logs in the EPC2 Windows user without requesting a password.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-2540

Publication date:
03/07/2025
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled prettyPhoto library (version 3.1.6) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-40722

Publication date:
03/07/2025
Stored Cross-Site Scripting (XSS) vulnerability in versions prior to Flatboard 3.2.2 of Flatboard Pro, consisting of a stored XSS due to lack of proper validation of user input, through the replace parameter in /config.php/tags.
Severity CVSS v4.0: MEDIUM
Last modification:
03/07/2025

CVE-2025-40723

Publication date:
03/07/2025
Stored Cross-Site Scripting (XSS) vulnerability in versions prior to Flatboard 3.2.2 of Flatboard Pro, consisting of a stored XSS due to lack of proper validation of user input, through the footer_text and announcement parameters in config.php.
Severity CVSS v4.0: MEDIUM
Last modification:
03/07/2025

CVE-2025-27452

Publication date:
03/07/2025
The configuration of the Apache httpd webserver which serves the MEAC300-FNADE4 web application, is partly insecure. There are modules activated that are not required for the operation of the FNADE4 web application. The functionality of the some modules <br /> <br /> pose a risk to the webserver which enable dircetory listing.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27453

Publication date:
03/07/2025
The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27454

Publication date:
03/07/2025
The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim&amp;#39;s browser&amp;#39;s saved authorization to execute the request.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27455

Publication date:
03/07/2025
The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27456

Publication date:
03/07/2025
The SMB server&amp;#39;s login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27457

Publication date:
03/07/2025
All communication between the VNC server and client(s) is unencrypted. This allows an attacker to intercept the traffic and obtain sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-27458

Publication date:
03/07/2025
The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025

CVE-2025-1710

Publication date:
03/07/2025
The maxView Storage Manager does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2025