Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-34191

Publication date:
19/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (macOS/Linux client deployments) contain an arbitrary file write vulnerability via the response file handling. When tasks produce output the service writes response data into files under /opt/PrinterInstallerClient/tmp/responses/ reusing the requested filename. The service follows symbolic links in the responses directory and writes as the service user (typically root), allowing a local, unprivileged user to cause the service to overwrite or create arbitrary files on the filesystem as root. This can be used to modify configuration files, replace or inject binaries or drivers, and otherwise achieve local privilege escalation and full system compromise. This vulnerability has been identified by the vendor as: V-2023-019 — Arbitrary File Write as Root.
Severity CVSS v4.0: HIGH
Last modification:
02/10/2025

CVE-2025-34192

Publication date:
19/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.893 and Application versions prior to 20.0.2140 (macOS/Linux client deployments) are built against OpenSSL 1.0.2h-fips (released May 2016), which has been end-of-life since 2019 and is no longer supported by the OpenSSL project. Continued use of this outdated cryptographic library exposes deployments to known vulnerabilities that are no longer patched, weakening the overall security posture. Affected daemons may emit deprecation warnings and rely on cryptographic components with unresolved security flaws, potentially enabling attackers to exploit weaknesses in TLS/SSL processing or cryptographic operations. This vulnerability has been identified by the vendor as: V-2023-021 — Out-of-Date OpenSSL Library.
Severity CVSS v4.0: CRITICAL
Last modification:
02/10/2025

CVE-2025-34193

Publication date:
19/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 include Windows client components (PrinterInstallerClientInterface.exe, PrinterInstallerClient.exe, PrinterInstallerClientLauncher.exe) that lack modern compile-time and runtime exploit mitigations and rely on outdated runtimes. These binaries are built as 32-bit, without Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), Control Flow Guard (CFG), or stack-protection, and they incorporate legacy technologies (Pascal/Delphi and Python 2) which are no longer commonly maintained. Several of these processes run with elevated privileges (NT AUTHORITY\SYSTEM for PrinterInstallerClient.exe and PrinterInstallerClientLauncher.exe), and the client automatically downloads and installs printer drivers. The absence of modern memory safety mitigations and the use of unmaintained runtimes substantially increase the risk that memory-corruption or other exploit primitives — for example from crafted driver content or maliciously crafted inputs — can be turned into remote or local code execution and privilege escalation to SYSTEM. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
Severity CVSS v4.0: HIGH
Last modification:
29/09/2025

CVE-2025-34194

Publication date:
19/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 (Windows client deployments) contain an insecure temporary-file handling vulnerability in the PrinterInstallerClient components. The software creates files as NT AUTHORITY\SYSTEM inside a directory under the control of the local user (C:\Users\%USER%\AppData\Local\Temp\). An attacker who can place symbolic links or otherwise influence filenames in that directory can cause the service to follow the link and write to arbitrary filesystem locations as SYSTEM. This allows a local, unprivileged user to overwrite or create files as SYSTEM, leading to local privilege escalation and the ability to modify configuration files, replace or inject binaries, or otherwise compromise confidentiality, integrity, and availability of the system. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
Severity CVSS v4.0: HIGH
Last modification:
29/09/2025

CVE-2024-13990

Publication date:
19/09/2025
MicroWorld eScan AV's update mechanism failed to ensure authenticity and integrity of updates: update packages were delivered and accepted without robust cryptographic verification. As a result, an on-path attacker could perform a man-in-the-middle (MitM) attack and substitute malicious update payloads for legitimate ones. The eScan AV client accepted these substituted packages and executed or loaded their components (including sideloaded DLLs and Java/installer payloads), enabling remote code execution on affected systems. MicroWorld eScan confirmed remediation of the update mechanism on 2023-07-31 but versioning details are unavailable. NOTE: MicroWorld eScan disputes the characterization in third-party reports, stating the issue relates to 2018–2019 and that controls were implemented then.
Severity CVSS v4.0: CRITICAL
Last modification:
22/09/2025

CVE-2025-26514

Publication date:
19/09/2025
StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 are <br /> susceptible to a Reflected Cross-Site Scripting vulnerability. <br /> Successful exploit could allow an attacker to view or modify <br /> configuration settings or add or modify user accounts but requires the <br /> attacker to know specific information about the target instance and then<br /> trick a privileged user into clicking a specially crafted link.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2025-26515

Publication date:
19/09/2025
StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 without <br /> Single Sign-on enabled are susceptible to a Server-Side Request Forgery <br /> (SSRF) vulnerability. Successful exploit could allow an unauthenticated <br /> attacker to change the password of any Grid Manager or Tenant Manager <br /> non-federated user.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2025-26516

Publication date:
19/09/2025
StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 are <br /> susceptible to a Denial of Service vulnerability. Successful exploit <br /> could allow an unauthenticated attacker to cause a Denial of Service on <br /> the Admin node.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2025-26517

Publication date:
19/09/2025
StorageGRID (formerly <br /> StorageGRID Webscale) versions prior to 11.8.0.15 and 11.9.0.8 are <br /> susceptible to a privilege escalation vulnerability. Successful exploit <br /> could allow an unauthorized authenticated attacker to discover Grid node<br /> names and IP addresses or modify Storage Grades.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2025-34188

Publication date:
19/09/2025
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (macOS/Linux client deployments) contain a vulnerability in the local logging mechanism. Authentication session tokens, including PHPSESSID, XSRF-TOKEN, and laravel_session, are stored in cleartext within world-readable log files. Any local user with access to the machine can extract these session tokens and use them to authenticate remotely to the SaaS environment, bypassing normal login credentials, potentially leading to unauthorized system access and exposure of sensitive information. This vulnerability has been identified by the vendor as: V-2022-008 — Secrets Leaked in Logs.
Severity CVSS v4.0: HIGH
Last modification:
02/10/2025

CVE-2022-4980

Publication date:
19/09/2025
General Bytes Crypto Application Server (CAS) beginning with version 20201208 prior to 20220531.38 (backport) and 20220725.22 (mainline) contains an authentication bypass in the admin web interface. An unauthenticated attacker could invoke the same URL used by the product&amp;#39;s default-installation / first-admin creation page and create a new administrative account remotely. By gaining admin privileges, the attacker can change the ATM configuration resulting in redirected funds. Public vendor advisories and multiple independent writeups describe the vulnerability as a call to the page used for initial/default installation / first administration user creation; General Bytes has not publicly published the exact endpoint/parameter name. The issue was actively exploited in the wild against cloud-hosted and standalone CAS deployments (scanning exposed CAS instances on ports 7777/443), and publicly acknowledged by the General Bytes in September 2022.
Severity CVSS v4.0: CRITICAL
Last modification:
22/09/2025

CVE-2025-10721

Publication date:
19/09/2025
A vulnerability was determined in Webull Investing &amp; Trading App 11.2.5.63 on Android. This vulnerability affects unknown code of the file AndroidManifest.xml. This manipulation causes improper export of android application components. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
22/09/2025