Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-58098

Publication date:
05/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: track changes_pkt_data property for global functions<br /> <br /> When processing calls to certain helpers, verifier invalidates all<br /> packet pointers in a current state. For example, consider the<br /> following program:<br /> <br /> __attribute__((__noinline__))<br /> long skb_pull_data(struct __sk_buff *sk, __u32 len)<br /> {<br /> return bpf_skb_pull_data(sk, len);<br /> }<br /> <br /> SEC("tc")<br /> int test_invalidate_checks(struct __sk_buff *sk)<br /> {<br /> int *p = (void *)(long)sk-&gt;data;<br /> if ((void *)(p + 1) &gt; (void *)(long)sk-&gt;data_end) return TCX_DROP;<br /> skb_pull_data(sk, 0);<br /> *p = 42;<br /> return TCX_PASS;<br /> }<br /> <br /> After a call to bpf_skb_pull_data() the pointer &amp;#39;p&amp;#39; can&amp;#39;t be used<br /> safely. See function filter.c:bpf_helper_changes_pkt_data() for a list<br /> of such helpers.<br /> <br /> At the moment verifier invalidates packet pointers when processing<br /> helper function calls, and does not traverse global sub-programs when<br /> processing calls to global sub-programs. This means that calls to<br /> helpers done from global sub-programs do not invalidate pointers in<br /> the caller state. E.g. the program above is unsafe, but is not<br /> rejected by verifier.<br /> <br /> This commit fixes the omission by computing field<br /> bpf_subprog_info-&gt;changes_pkt_data for each sub-program before main<br /> verification pass.<br /> changes_pkt_data should be set if:<br /> - subprogram calls helper for which bpf_helper_changes_pkt_data<br /> returns true;<br /> - subprogram calls a global function,<br /> for which bpf_subprog_info-&gt;changes_pkt_data should be set.<br /> <br /> The verifier.c:check_cfg() pass is modified to compute this<br /> information. The commit relies on depth first instruction traversal<br /> done by check_cfg() and absence of recursive function calls:<br /> - check_cfg() would eventually visit every call to subprogram S in a<br /> state when S is fully explored;<br /> - when S is fully explored:<br /> - every direct helper call within S is explored<br /> (and thus changes_pkt_data is set if needed);<br /> - every call to subprogram S1 called by S was visited with S1 fully<br /> explored (and thus S inherits changes_pkt_data from S1).<br /> <br /> The downside of such approach is that dead code elimination is not<br /> taken into account: if a helper call inside global function is dead<br /> because of current configuration, verifier would conservatively assume<br /> that the call occurs for the purpose of the changes_pkt_data<br /> computation.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2025-4316

Publication date:
05/05/2025
Improper access control in PAM feature in Devolutions Server allows a PAM user to self approve their PAM requests even if disallowed by the configured policy via specific user interface actions.<br /> <br /> <br /> <br /> <br /> <br /> This issue affects Devolutions Server versions from 2025.1.3.0 through 2025.1.6.0, and all versions up to 2024.3.15.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2025-47268

Publication date:
05/05/2025
ping in iputils before 20250602 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2026

CVE-2025-28168

Publication date:
05/05/2025
The Multiple File Upload add-on component 3.1.0 for OutSystems is vulnerable to Unrestricted File Upload. This occurs because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify a parameter to bypass extension restrictions and upload arbitrary files. NOTE: this is a third-party component that is not supplied or supported by OutSystems.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2025

CVE-2025-45751

Publication date:
05/05/2025
SourceCodester Web Based Pharmacy Product Management System 1.0 is vulnerable to Cross Site Scripting (XSS) in add-admin.php via the Fullname text field.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2025-2545

Publication date:
05/05/2025
Vulnerability in Best Practical Solutions, LLC&amp;#39;s Request Tracker prior to v5.0.8, where the Triple DES (3DES) cryptographic algorithm is used to protect emails sent with S/MIME encryption. Triple DES is considered obsolete and insecure due to its susceptibility to birthday attacks, which could compromise the confidentiality of encrypted messages.
Severity CVSS v4.0: LOW
Last modification:
03/11/2025

CVE-2025-4272

Publication date:
05/05/2025
A vulnerability was found in Mechrevo Control Console 1.0.2.70. It has been rated as critical. Affected by this issue is some unknown functionality in the library C:\Program Files\OEM\MECHREVO Control Center\UniwillService\MyControlCenter\csCAPI.dll of the component GCUService. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
05/05/2025

CVE-2025-2905

Publication date:
05/05/2025
Due to the improper configuration of XML parser, user-supplied XML is parsed without applying sufficient restrictions, enabling XML External Entity (XXE) resolution in multiple WSO2 Products.<br /> <br /> A successful XXE attack could allow a remote, unauthenticated attacker to:<br /> * Read sensitive files from the server’s filesystem.<br /> * Perform denial-of-service (DoS) attacks, which can render the affected service unavailable.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2025

CVE-2025-4270

Publication date:
05/05/2025
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi of the component Config Handler. The manipulation of the argument topicurl with the input getInitCfg/getSysStatusCfg leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
07/05/2025

CVE-2025-4271

Publication date:
05/05/2025
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input showSyslog leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
07/05/2025

CVE-2025-4269

Publication date:
05/05/2025
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
07/05/2025

CVE-2025-4268

Publication date:
05/05/2025
A vulnerability has been found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input RebootSystem leads to missing authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
07/05/2025