Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-2517

Publication date:
21/04/2025
Reference to Expired Domain Vulnerability in OpenText™ ArcSight Enterprise Security Manager.
Severity CVSS v4.0: LOW
Last modification:
23/04/2025

CVE-2025-28121

Publication date:
21/04/2025
code-projects Online Exam Mastering System 1.0 is vulnerable to Cross Site Scripting (XSS) in feedback.php via the "q" parameter allowing remote attackers to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2025-29287

Publication date:
21/04/2025
An arbitrary file upload vulnerability in the ueditor component of MCMS v5.4.3 allows attackers to execute arbitrary code via uploading a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-12863

Publication date:
21/04/2025
Stored XSS in Discussions in OpenText Content Management CE 20.2 to 25.1 on Windows and Linux allows authenticated malicious users to inject code into the system.
Severity CVSS v4.0: MEDIUM
Last modification:
23/04/2025

CVE-2024-42699

Publication date:
21/04/2025
Cross Site Scripting vulnerability in Create/Modify article function in Alkacon OpenCMS 17.0 allows remote attacker to inject javascript payload via image title sub-field in the image field
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-12862

Publication date:
21/04/2025
Incorrect Authorization vulnerability in the OpenText Content Server REST API on Windows, Linux allows users without the appropriate permissions to remove external collaborators.This issue affects Content Server: 20.2-24.4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/04/2025

CVE-2025-43916

Publication date:
21/04/2025
Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with "Decompiling the app revealed a hardcoded secret."
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2024-41446

Publication date:
21/04/2025
A stored cross-site scripting (XSS) vulnerability in Alkacon OpenCMS v17.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the image parameter under the Create/Modify article function.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2025-32408

Publication date:
21/04/2025
In Soffid Console 3.6.31 before 3.6.32, authorization to use the pam service is mishandled.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2025

CVE-2025-3837

Publication date:
21/04/2025
An improper input validation vulnerability is identified in the End of Life (EOL) OVA based connect component which is deployed for installation purposes in the customer internal network. This EOL component was deprecated in September 2023 with end of support extended till January 2024. Under certain circumstances, an actor can manipulate a specific request parameter and inject code execution payload which could lead to a remote code execution on the infrastructure hosting this component.
Severity CVSS v4.0: MEDIUM
Last modification:
21/04/2025

CVE-2025-3838

Publication date:
21/04/2025
An Improper Authorization vulnerability was identified in the EOL OVA based connect component which is deployed for installation purposes in the customer internal network. Under certain conditions, this could allow a bad actor to gain unauthorized access to the local db containing weakly hashed credentials of the installer. This EOL component was deprecated in September 2023 with end of support extended till January 2024.
Severity CVSS v4.0: MEDIUM
Last modification:
21/04/2025

CVE-2025-3840

Publication date:
21/04/2025
An improper neutralization of input vulnerability was identified in the End of Life (EOL) OVA based connect installer component which is deployed for installation purposes in a customer network. This EOL component was deprecated in September 2023 with end of support extended till January 2024. An actor can manipulate the action parameter of the login form to inject malicious scripts which would lead to a XSS attack under certain conditions.
Severity CVSS v4.0: LOW
Last modification:
21/04/2025