Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-20113

Publication date:
21/05/2025
A vulnerability in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to elevate privileges to Administrator for a limited set of functions on an affected system.<br /> <br /> This vulnerability is due to insufficient server-side validation of user-supplied parameters in API or HTTP requests. An attacker could exploit this vulnerability by submitting a crafted API or HTTP request to an affected system. A successful exploit could allow the attacker to access, modify, or delete data beyond the sphere of their intended access level, including obtaining potentially sensitive information stored in the system.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-20114

Publication date:
21/05/2025
A vulnerability in the API of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform a horizontal privilege escalation attack on an affected system.<br /> <br /> This vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference attack. A successful exploit could allow the attacker to access specific data that is associated with different users on the affected system.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-0372

Publication date:
21/05/2025
Concurrent Execution using Shared Resource with Improper Synchronization (&amp;#39;Race Condition&amp;#39;) vulnerability in HYPR Passwordless on Windows allows Privilege Escalation.This issue affects HYPR Passwordless: before 10.1.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-20112

Publication date:
21/05/2025
A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device.<br /> <br /> This vulnerability is due to excessive permissions that have been assigned to system commands.&amp;nbsp;An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-4008

Publication date:
21/05/2025
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.<br /> <br /> This web interface exposes an endpoint that is vulnerable to command injection.<br /> <br /> Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
Severity CVSS v4.0: HIGH
Last modification:
27/10/2025

CVE-2025-48206

Publication date:
21/05/2025
The ns_backup extension through 13.0.0 for TYPO3 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2025

CVE-2025-48207

Publication date:
21/05/2025
The reint_downloadmanager extension through 5.0.0 for TYPO3 allows Insecure Direct Object Reference.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48200

Publication date:
21/05/2025
The sr_feuser_register extension through 12.4.8 for TYPO3 allows Remote Code Execution.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48201

Publication date:
21/05/2025
The ns_backup extension through 13.0.0 for TYPO3 has a Predictable Resource Location.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48202

Publication date:
21/05/2025
The femanager extension through 8.2.1 for TYPO3 allows Insecure Direct Object Reference.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48203

Publication date:
21/05/2025
The cs_seo extension through 9.2.0 for TYPO3 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48204

Publication date:
21/05/2025
The ns_backup extension through 13.0.0 for TYPO3 allows command injection.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026