Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-40918

Publication date:
16/07/2025
Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely.<br /> <br /> The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.<br /> <br /> According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation<br /> depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-3871

Publication date:
16/07/2025
Broken access control in Fortra&amp;#39;s GoAnywhere MFT prior to 7.8.1 allows an attacker to create a denial of service situation when configured to use GoAnywhere One-Time Password (GOTP) email two-factor authentication (2FA) and the user has not set an email address. In this scenario, the attacker may enter the email address of a known user when prompted and the user will be disabled if that user has configured GOTP.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2025

CVE-2025-40923

Publication date:
16/07/2025
Plack-Middleware-Session before version 0.35 for Perl generates session ids insecurely.<br /> <br /> The default session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.<br /> <br /> Predicable session ids could allow an attacker to gain access to systems.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-34300

Publication date:
16/07/2025
A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the  ciwweb.pl http://ciwweb.pl/  Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands.
Severity CVSS v4.0: CRITICAL
Last modification:
04/11/2025

CVE-2025-53755

Publication date:
16/07/2025
This vulnerability exists in Digisol DG-GR6821AC Router due to storage of credentials and PINS without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted data stored in the firmware of targeted device.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the network of the targeted device.
Severity CVSS v4.0: MEDIUM
Last modification:
16/07/2025

CVE-2025-53756

Publication date:
16/07/2025
This vulnerability exists in Digisol DG-GR6821AC Router due to cleartext transmission of credentials in its web management interface. A remote attacker could exploit this vulnerability by intercepting the network traffic and capturing cleartext credentials. <br /> <br /> Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
Severity CVSS v4.0: HIGH
Last modification:
16/07/2025

CVE-2025-53757

Publication date:
16/07/2025
This vulnerability exists in Digisol DG-GR6821AC Router due to misconfiguration of both Secure and HttpOnly flags on session cookies associated with the router web interface. A remote attacker could exploit this vulnerability by capturing the session cookies transmitted over an unsecure HTTP connection. <br /> <br /> Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information from the targeted device.
Severity CVSS v4.0: HIGH
Last modification:
16/07/2025

CVE-2025-53758

Publication date:
16/07/2025
This vulnerability exists in Digisol DG-GR6821AC Router due to use of default admin credentials at its web management interface. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the hardcoded default credentials stored in the firmware of the targeted device.<br /> <br /> Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted device.
Severity CVSS v4.0: MEDIUM
Last modification:
16/07/2025

CVE-2025-52786

Publication date:
16/07/2025
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Kingdom Creation Media Folder allows Reflected XSS. This issue affects Media Folder: from n/a through 1.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2025

CVE-2025-52787

Publication date:
16/07/2025
Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in EZiHosting Tennis Court Bookings allows Reflected XSS. This issue affects Tennis Court Bookings: from n/a through 1.2.7.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2025

CVE-2025-52803

Publication date:
16/07/2025
Missing Authorization vulnerability in uxper Sala allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Sala: from n/a through 1.1.3.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2025

CVE-2025-52804

Publication date:
16/07/2025
Missing Authorization vulnerability in uxper Nuss allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Nuss: from n/a through 1.3.3.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2025