Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-4777

Publication date:
16/05/2025
A vulnerability was found in PHPGurukul Park Ticketing Management System 2.0. It has been classified as critical. This affects an unknown part of the file /view-foreigner-ticket.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
21/05/2025

CVE-2025-2305

Publication date:
16/05/2025
A Path traversal vulnerability in the file<br /> download functionality was identified. This vulnerability allows<br /> unauthenticated users to download arbitrary files, in the context of the<br /> application server, from the Linux server.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2025-2306

Publication date:
16/05/2025
An Improper Access Control vulnerability was<br /> identified in the file download functionality. This vulnerability allows users<br /> to download sensitive documents without authentication, if the URL is known.<br /> <br /> <br /> <br /> The attack<br /> requires the attacker to know the documents UUIDv4.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2025-40629

Publication date:
16/05/2025
PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.
Severity CVSS v4.0: HIGH
Last modification:
16/05/2025

CVE-2025-40907

Publication date:
16/05/2025
FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library.<br /> <br /> The included FastCGI library is affected by CVE-2025-23016, causing an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2025-37890

Publication date:
16/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc<br /> <br /> As described in Gerrard&amp;#39;s report [1], we have a UAF case when an hfsc class<br /> has a netem child qdisc. The crux of the issue is that hfsc is assuming<br /> that checking for cl-&gt;qdisc-&gt;q.qlen == 0 guarantees that it hasn&amp;#39;t inserted<br /> the class in the vttree or eltree (which is not true for the netem<br /> duplicate case).<br /> <br /> This patch checks the n_active class variable to make sure that the code<br /> won&amp;#39;t insert the class in the vttree or eltree twice, catering for the<br /> reentrant case.<br /> <br /> [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2025

CVE-2024-40120

Publication date:
16/05/2025
seaweedfs v3.68 was discovered to contain a SQL injection vulnerability via the component /abstract_sql/abstract_sql_store.go.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2025-4771

Publication date:
16/05/2025
A vulnerability, which was classified as critical, was found in PHPGurukul Online Course Registration 3.1. Affected is an unknown function of the file /admin/course.php. The manipulation of the argument coursecode leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
21/05/2025

CVE-2025-4772

Publication date:
16/05/2025
A vulnerability has been found in PHPGurukul Online Course Registration 3.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/department.php. The manipulation of the argument department leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
21/05/2025

CVE-2025-4770

Publication date:
16/05/2025
A vulnerability, which was classified as critical, has been found in PHPGurukul Park Ticketing Management System 2.0. This issue affects some unknown processing of the file /view-normal-ticket.php. The manipulation of the argument viewid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
05/06/2025

CVE-2025-40631

Publication date:
16/05/2025
HTTP host header injection vulnerability in Icewarp Mail Server affecting version 11.4.0. By modifying the Host header and adding a payload, arbitrary JavaScript code can be executed on page load. The user must interact with a malicious link to be redirected.
Severity CVSS v4.0: LOW
Last modification:
09/10/2025

CVE-2025-40632

Publication date:
16/05/2025
Cross-site scripting (XSS) in Icewarp Mail Server affecting version 11.4.0. This vulnerability allows an attacker to modify the “lastLogin” cookie with malicious JavaScript code that will be executed when the page is rendered.
Severity CVSS v4.0: LOW
Last modification:
09/10/2025