Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-9079

Publication date:
19/09/2025
Mattermost versions 10.8.x
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2025-9081

Publication date:
19/09/2025
Mattermost versions 10.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2025-57396

Publication date:
19/09/2025
Tandoor Recipes 2.0.0-alpha-1, fixed in 2.0.0-alpha-2, is vulnerable to privilege escalation. This is due to the rework of the API, which resulted in the User Profile API Endpoint containing two boolean values indicating whether a user is staff or administrative. Consequently, any user can escalate their privileges to the highest level.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-59689

Publication date:
19/09/2025
Libraesva ESG 4.5 through 5.5.x before 5.5.7 allows command injection via a compressed e-mail attachment. For ESG 5.0 a fix has been released in 5.0.31. For ESG 5.1 a fix has been released in 5.1.20. For ESG 5.2 a fix has been released in 5.2.31. For ESG 5.4 a fix has been released in 5.4.8. For ESG 5.5. a fix has been released in 5.5.7.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-54815

Publication date:
19/09/2025
Server-side template injection (SSTI) vulnerability in PPress 0.0.9 allows attackers to execute arbitrary code via crafted themes.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2025-52159

Publication date:
19/09/2025
Hardcoded credentials in default configuration of PPress 0.0.9.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2025-54761

Publication date:
19/09/2025
An issue was discovered in PPress 0.0.9 allowing attackers to gain escilated privlidges via crafted session cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
25/09/2025

CVE-2025-56762

Publication date:
19/09/2025
Paracrawl KeOPs v2 is vulnerable to Cross Site Scripting (XSS) in error.php.
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-43809

Publication date:
19/09/2025
Cross-Site Request Forgery (CSRF) vulnerability in the server (license) registration page in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.7, 2023.Q3.1 through 2023.Q3.9, 7.4 GA through update 92, and older unsupported versions allows remote attackers to register a server license via the 'orderUuid' parameter.
Severity CVSS v4.0: MEDIUM
Last modification:
16/12/2025

CVE-2025-10568

Publication date:
19/09/2025
HyperX NGENUITY software is potentially vulnerable to arbitrary code execution. HP is releasing updated software to address the potential vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
16/01/2026

CVE-2025-34202

Publication date:
19/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to 25.2.169 and Application prior to 25.2.1518 (VA and SaaS deployments) expose Docker internal networks in a way that allows an attacker on the same external L2 segment — or an attacker able to add routes using the appliance as a gateway — to reach container IPs directly. This grants access to internal services (HTTP APIs, Redis, MySQL, etc.) that are intended to be isolated inside the container network. Many of those services are accessible without authentication or are vulnerable to known exploitation chains. As a result, compromise of a single reachable endpoint or basic network access can enable lateral movement, remote code execution, data exfiltration, and full system compromise. This vulnerability has been identified by the vendor as: V-2025-003 — Insecure Access to Docker Instance from WAN.
Severity CVSS v4.0: HIGH
Last modification:
02/10/2025

CVE-2025-34203

Publication date:
19/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.1002 and Application versions prior to 20.0.2614 (VA and SaaS deployments) contain multiple Docker containers that include outdated, end-of-life, unsupported, or otherwise vulnerable third-party components (examples: Nginx 1.17.x, OpenSSL 1.1.1d, various EOL Alpine/Debian/Ubuntu base images, and EOL Laravel/PHP libraries). These components are present across many container images and increase the product's attack surface, enabling exploitation chains when leveraged by an attacker. Multiple distinct EOL versions and unpatched libraries across containers; Nginx binaries date from 2019 in several images and Laravel versions observed include EOL releases (for example Laravel 5.5.x, 5.7.x, 5.8.x). This vulnerability has been identified by the vendor as: V-2024-014 — Outdated Dependencies.
Severity CVSS v4.0: CRITICAL
Last modification:
02/10/2025