Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-60267

Publication date:
09/10/2025
In xckk v9.6, there is a SQL injection vulnerability in which the cond parameter in notice/list is not securely filtered, resulting in a SQL injection vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2025

CVE-2025-11550

Publication date:
09/10/2025
A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used.
Severity CVSS v4.0: HIGH
Last modification:
20/10/2025

CVE-2025-60266

Publication date:
09/10/2025
In xckk v9.6, there is a SQL injection vulnerability in which the orderBy parameter in address/list is not securely filtered, resulting in a SQL injection vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2025

CVE-2025-60304

Publication date:
09/10/2025
code-projects Simple Scheduling System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Subject Description field.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2025

CVE-2025-60010

Publication date:
09/10/2025
A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change.<br /> <br /> Affected devices allow logins by users for whom the RADIUS server has responded with a reject and required the user to change the password as their password was expired. Therefore the policy mandating the password change is not enforced.<br /> This does not allow users to login with a wrong password, but only with the correct but expired one.<br /> <br /> <br /> <br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> <br /> <br /> * all versions before 22.4R3-S8,<br /> * 23.2 versions before 23.2R2-S4,<br /> * 23.4 versions before 23.4R2-S5,<br /> * 24.2 versions before 24.2R2-S1,<br /> * 24.4 versions before 24.4R1-S3, 24.4R2;<br /> <br /> <br /> <br /> <br /> Junos OS Evolved:<br /> <br /> <br /> <br /> * all versions before 22.4R3-S8-EVO,<br /> * 23.2 versions before 23.2R2-S4-EVO,<br /> * 23.4 versions before 23.4R2-S5-EVO,<br /> * 24.2 versions before 24.2R2-S1-EVO,<br /> * 24.4 versions before 24.4R1-S3-EVO, 24.4R2-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-60009

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the <br /> <br /> CLI Configlet<br /> <br /> page that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.<br /> <br /> This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-60004

Publication date:
09/10/2025
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS).<br /> <br /> When an affected system receives a specific BGP EVPN update message over an established BGP session, this causes an rpd crash and restart.<br /> <br /> A BGP EVPN configuration is not necessary to be vulnerable. If peers are not configured to send BGP EVPN updates to a vulnerable device, then this issue can&amp;#39;t occur.<br /> <br /> This issue affects iBGP and eBGP, over IPv4 and IPv6.<br /> <br /> <br /> This issue affects:<br /> Junos OS:<br /> * 23.4 versions from <br /> <br /> 23.4R2-S3 before 23.4R2-S5,<br /> * 24.2 versions from <br /> <br /> 24.2R2 <br /> <br /> before 24.2R2-S1,<br /> * 24.4 versions before 24.4R1-S3, 24.4R2;<br /> <br /> <br /> <br /> Junos OS Evolved:<br /> * 23.4-EVO versions from 23.4R2-S2-EVO before 23.4R2-S5-EVO,<br /> * 24.2-EVO versions from 24.2R2-EVO before 24.2R2-S1-EVO,<br /> * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2025-60006

Publication date:
09/10/2025
Multiple instances of an Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS Command Injection&amp;#39;) <br /> <br /> vulnerability in the CLI of Juniper Networks Junos OS Evolved could be used to elevate privileges and/or execute unauthorized commands.<br /> <br /> When an attacker executes crafted CLI commands, the options are processed via a script in some cases. These scripts are not hardened so injected commands might be executed via the shell, which allows an attacker to perform operations, which they should not be able to do according to their assigned permissions.<br /> <br /> This issue affects Junos OS Evolved:<br /> <br /> <br /> <br /> * 24.2 versions before 24.2R2-S2-EVO,<br /> * 24.4 versions before 24.4R2-EVO.<br /> <br /> <br /> <br /> <br /> This issue does not affect Junos OS Evolved versions earlier than 24.2R1-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-60000

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Generate Report page that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.<br /> This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-60002

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Template Definitions page that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.<br /> This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-60001

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Generate Report page that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.<br /> This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59999

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the API Access Profiles page that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.<br /> This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026