Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-2775

Publication date:
07/05/2025
SysAid On-Prem versions
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2025

CVE-2025-2777

Publication date:
07/05/2025
SysAid On-Prem versions
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2025-2778

Publication date:
07/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2025-29448

Publication date:
07/05/2025
Booking logic flaw in Easy!Appointments v1.5.1 allows unauthenticated attackers to create appointments with excessively long durations, causing a denial of service by blocking all future booking availability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2026

CVE-2025-47439

Publication date:
07/05/2025
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Chill Download Monitor download-monitor allows PHP Local File Inclusion.This issue affects Download Monitor: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2026

CVE-2025-29153

Publication date:
07/05/2025
SQL Injection vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via the Data export, filters functions.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025

CVE-2025-29154

Publication date:
07/05/2025
HTML injection vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via the .galera.app/ted/solicitacao_treinamento/, .galera.app/rh/metas/perspectiva_estrategica/edicao/, .galera.app/rh/cadastros/perspectivas/listagem/adc/, .galera.app/escolaridade/listagem/, .galera.app/estados_civis/cadastro/, .galera.app/nivel_hierarquico/listagem/, .galera.app/nivel_decisorio/cadastro/, .galera.app/escolaridade/cadastro/, .galera.app/nivel_decisorio/listagem/, .galera.app/rh/cadastros/perspectivas/listagem/, .galera.app/empresas_grupo/cadastro/, .galera.app/empresas/edicao/, .galera.app/liais/listagem/, .galera.app/noticias/listagem/, .galera.app/gerenciamento-de-ciclo/abertura/cadastrar, .galera.app/colaborador/cadastro/cursos/adc/edicao/, .galera.app/colaborador/cadastro/adc/, .galera.app/cads_aux/escalact/, .galera.app/ncf/tec/cadastro/ct/ .galera.app/rh/metas/painel/, .galera.app/rh/metas/equipe/edicao/, .galera.app/rh/pdi/tipo_recursos/edicao/, .galera.app/rh/pdi/familia_recursos/cadastro/, .galera.app/rh/pdi/fornecedores/edicao/, and .galera.app/rh/pdi/recursos/cadastro/ components.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2025

CVE-2025-29602

Publication date:
07/05/2025
flatpress 1.3.1 is vulnerable to Cross Site Scripting (XSS) in Administration area via Manage categories.
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2025-29152

Publication date:
07/05/2025
Cross-Site Scripting vulnerability in lemeconsultoria HCM galera.app v.4.58.0 allows an attacker to execute arbitrary code via multiple components, including Strategic Planning Perspective Registration, Training Request, Perspective Editing, Education Registration, Hierarchical Level Registration, Decision Level Registration, Perspective Registration, Company Group Registration, Company Registration, News Registration, Employee Editing, Goal Team Registration, Learning Resource Type Registration, Learning Resource Family Registration, Learning Resource Supplier Registration, and Cycle Maintenance.
Severity CVSS v4.0: Pending analysis
Last modification:
09/07/2025

CVE-2020-36791

Publication date:
07/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net_sched: keep alloc_hash updated after hash allocation<br /> <br /> In commit 599be01ee567 ("net_sched: fix an OOB access in cls_tcindex")<br /> I moved cp-&gt;hash calculation before the first<br /> tcindex_alloc_perfect_hash(), but cp-&gt;alloc_hash is left untouched.<br /> This difference could lead to another out of bound access.<br /> <br /> cp-&gt;alloc_hash should always be the size allocated, we should<br /> update it after this tcindex_alloc_perfect_hash().
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2025-33093

Publication date:
07/05/2025
IBM Sterling Partner Engagement Manager 6.1.0, 6.2.0, 6.2.2 JWT secret is stored in public Helm Charts and is not stored as a Kubernetes secret.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2025-4104

Publication date:
07/05/2025
The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the fed_wp_ajax_fed_login_form_post() function in versions 1.0 to 2.2.6. This makes it possible for unauthenticated attackers to reset the administrator’s email and password, and elevate their privileges to that of an administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025