Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-41458

Publication date:
21/07/2025
Unencrypted storage in the database in Two App Studio Journey v5.5.9 for iOS allows local attackers to extract sensitive data via direct access to the app’s filesystem.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41459

Publication date:
21/07/2025
Insufficient protection against brute-force and runtime manipulation in the local authentication component in Two App Studio Journey 5.5.6 on iOS allows local attackers to bypass biometric and PIN-based access control via repeated PIN attempts or dynamic code injection.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-5681

Publication date:
21/07/2025
Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 23.06.2025.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41679

Publication date:
21/07/2025
An unauthenticated remote attacker could exploit a buffer overflow vulnerability in the device causing a denial of service that affects only the network initializing wizard (Conftool) service.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41681

Publication date:
21/07/2025
A high privileged remote attacker can gain persistent XSS via POST requests due to improper neutralization of special elements used to create dynamic content.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-49656

Publication date:
21/07/2025
Users with administrator access can create databases files outside the files area of the Fuseki server. This issue affects Apache Jena version up to 5.4.0. Users are recommended to upgrade to version 5.5.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-50151

Publication date:
21/07/2025
File access paths in configuration files uploaded by users with administrator access are not validated. This issue affects Apache Jena version up to 5.4.0. Users are recommended to upgrade to version 5.5.0, which does not allow arbitrary configuration upload.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41674

Publication date:
21/07/2025
A high privileged remote attacker can execute arbitrary system commands via POST requests in the diagnostic action due to improper neutralization of special elements used in an OS command.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41675

Publication date:
21/07/2025
A high privileged remote attacker can execute arbitrary system commands via GET requests in the cloud server communication script due to improper neutralization of special elements used in an OS command.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41676

Publication date:
21/07/2025
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41677

Publication date:
21/07/2025
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-mail action in fast succession.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-41678

Publication date:
21/07/2025
A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025