Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-43000

Publication date:
05/11/2025
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2026

CVE-2025-56231

Publication date:
05/11/2025
Tonec Internet Download Manager 6.42.41.1 and earlier suffers from Missing SSL Certificate Validation, which allows attackers to bypass update protections.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2026

CVE-2025-10907

Publication date:
05/11/2025
An arbitrary file upload vulnerability exists in multiple WSO2 products due to insufficient validation of uploaded content and destination in SOAP admin services. A malicious actor with administrative privileges can upload a specially crafted file to a user-controlled location within the deployment.<br /> <br /> Successful exploitation may lead to remote code execution (RCE) on the server, depending on how the uploaded file is processed. By default, this vulnerability is only exploitable by users with administrative access to the affected SOAP services.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-10713

Publication date:
05/11/2025
An XML External Entity (XXE) vulnerability exists in multiple WSO2 products due to improper configuration of the XML parser. The application parses user-supplied XML without applying sufficient restrictions, allowing resolution of external entities.<br /> <br /> A successful attack could enable a remote, unauthenticated attacker to read sensitive files from the server&amp;#39;s filesystem or perform denial-of-service (DoS) attacks that render affected services unavailable.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-63248

Publication date:
05/11/2025
DWSurvey 6.14.0 is vulnerable to Incorrect Access Control. When deleting a questionnaire, replacing the questionnaire ID with the ID of another questionnaire can enable the deletion of other questionnaires.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-57244

Publication date:
05/11/2025
OpenKM Community Edition 6.3.12 is vulnerable to stored cross-site scripting (XSS) in the user account creation interface. The Name field accepts script tags and the Email field is vulnerable when the POST request is modified to include encoded script tags, by passing frontend validation.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-59716

Publication date:
05/11/2025
ownCloud Guests before 0.12.5 allows unauthenticated user enumeration via the /apps/guests/register/{email}/{token} endpoint. Because of insufficient validation of the supplied token in showPasswordForm, the server responds differently when an e-mail address corresponds to a valid pending guest user rather than a non-existent user.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2026

CVE-2025-46365

Publication date:
05/11/2025
Dell CloudLink, versions prior 8.1.1, contain a Command Injection vulnerability which can be exploited by an Authenticated attacker to cause Command Injection on an affected Dell CloudLink.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-46366

Publication date:
05/11/2025
Dell CloudLink, versions prior to 8.1.1, contain a vulnerability where a privileged user may exploit and gain parallel privilege escalation or access to the database to obtain confidential information.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-46424

Publication date:
05/11/2025
Dell CloudLink, versions prior to 8.2, contain use of a Cryptographic Primitive with a Risky Implementation vulnerability. A high privileged attacker could potentially exploit this vulnerability leading to Denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-45378

Publication date:
05/11/2025
Dell CloudLink, versions 8.0 through 8.1.2, contain vulnerability on restricted shell. A Privileged user with known password can break into command shell of CloudLink server and gain access of shell and escalate privilege, gain unauthorized access of system.<br /> <br /> If ssh is enabled with web credentials of server, attack is possible through network with known privileged user/password.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025

CVE-2025-45379

Publication date:
05/11/2025
Dell CloudLink, versions prior to 8.2, contain a vulnerability where a privileged user with known password can run command injection from console to gain shell access of system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2025