Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-44091

Publication date:
12/06/2025
yangyouwang crud v1.0.0 is vulnerable to Cross Site Scripting (XSS) via the role management function.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2025-27689

Publication date:
12/06/2025
Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2025-6031

Publication date:
12/06/2025
Amazon Cloud Cam is a home security camera that was deprecated on December 2, 2022, is end of life, and is no longer actively supported. <br /> <br /> When a user powers on the Amazon Cloud Cam, the device attempts to connect to a remote service infrastructure that has been deprecated due to end-of-life status. The device defaults to a pairing status in which an arbitrary user can bypass SSL pinning to associate the device to an arbitrary network, allowing for network traffic interception and modification.<br /> <br /> We recommend customers discontinue usage of any remaining Amazon Cloud Cams.
Severity CVSS v4.0: HIGH
Last modification:
16/06/2025

CVE-2025-5484

Publication date:
12/06/2025
A username and password are required to authenticate to the central <br /> SinoTrack device management interface. The username for all devices is <br /> an identifier printed on the receiver. The default password is <br /> well-known and common to all devices. Modification of the default <br /> password is not enforced during device setup. A malicious actor can <br /> retrieve device identifiers with either physical access or by capturing <br /> identifiers from pictures of the devices posted on publicly accessible <br /> websites such as eBay.
Severity CVSS v4.0: HIGH
Last modification:
16/06/2025

CVE-2025-5485

Publication date:
12/06/2025
User names used to access the web management interface are limited to <br /> the device identifier, which is a numerical identifier no more than 10 <br /> digits. A malicious actor can enumerate potential targets by <br /> incrementing or decrementing from known identifiers or through <br /> enumerating random digit sequences.
Severity CVSS v4.0: HIGH
Last modification:
16/06/2025

CVE-2025-2745

Publication date:
12/06/2025
A cross-site scripting vulnerability exists in AVEVA PI Web API version 2023 <br /> SP1 and prior that, if exploited, could allow an authenticated attacker <br /> (with privileges to create/update annotations or upload media files) to <br /> persist arbitrary JavaScript code that will be executed by users who <br /> were socially engineered to disable content security policy protections <br /> while rendering annotation attachments from within a web browser.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-36539

Publication date:
12/06/2025
AVEVA PI Data Archive products <br /> are vulnerable to an uncaught exception that, if exploited, could allow <br /> an authenticated user to shut down certain necessary PI Data Archive <br /> subsystems, resulting in a denial of service.
Severity CVSS v4.0: HIGH
Last modification:
16/06/2025

CVE-2025-44019

Publication date:
12/06/2025
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if <br /> exploited, could allow an authenticated user to shut down certain <br /> necessary PI Data Archive subsystems, resulting in a denial of service. <br /> Depending on the timing of the crash, data present in snapshots/write <br /> cache may be lost.
Severity CVSS v4.0: HIGH
Last modification:
16/06/2025

CVE-2025-4417

Publication date:
12/06/2025
A cross-site scripting vulnerability exists in <br /> AVEVA PI Connector for CygNet <br /> Versions 1.6.14 and prior that, if exploited, could allow an <br /> administrator miscreant with local access to the connector admin portal <br /> to persist arbitrary JavaScript code that will be executed by other <br /> users who visit affected pages.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-4418

Publication date:
12/06/2025
An improper validation of integrity check value vulnerability exists in <br /> <br /> AVEVA PI Connector for CygNet Versions 1.6.14 and prior that, if exploited, <br /> could allow a miscreant with elevated privileges to modify PI Connector <br /> for CygNet local data files (cache and buffers) in a way that causes the<br /> connector service to become unresponsive.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-48699

Publication date:
12/06/2025
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
12/06/2025

CVE-2025-49575

Publication date:
12/06/2025
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Multiple system messages are inserted into the CommandPaletteFooter as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025