Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-4064

Publication date:
29/04/2025
A vulnerability was found in ScriptAndTools Online-Travling-System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/viewenquiry.php. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
09/05/2025

CVE-2025-4082

Publication date:
29/04/2025
Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges.<br /> *This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.* This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-3301

Publication date:
29/04/2025
DPA countermeasures are unavailable for ECDH key agreement and EdDSA signing operations on Curve25519 and Curve448 on all Series 2 modules and SoCs due to a lack of hardware and software support. A successful DPA attack may result in exposure of confidential information. The best practice is to use the impacted crypto curves and operations with ephemeral keys to reduce the number of DPA traces that can be collected.
Severity CVSS v4.0: LOW
Last modification:
02/05/2025

CVE-2025-2817

Publication date:
29/04/2025
Thunderbird&amp;#39;s update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-4060

Publication date:
29/04/2025
A vulnerability, which was classified as critical, has been found in PHPGurukul Notice Board System 1.0. This issue affects some unknown processing of the file /category.php. The manipulation of the argument catname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
09/05/2025

CVE-2025-4061

Publication date:
29/04/2025
A vulnerability, which was classified as critical, was found in code-projects Clothing Store Management System up to 1.0. Affected is the function add_item. The manipulation of the argument st.productname leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
09/05/2025

CVE-2025-4035

Publication date:
29/04/2025
A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious website to set cookies for domains it does not own, potentially leading to integrity issues such as session fixation.
Severity CVSS v4.0: Pending analysis
Last modification:
26/05/2025

CVE-2025-3891

Publication date:
29/04/2025
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/07/2025

CVE-2025-3929

Publication date:
29/04/2025
An XSS issue was discovered in MDaemon Email Server version 25.0.1 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user&amp;#39;s browser window, and access user data.
Severity CVSS v4.0: MEDIUM
Last modification:
12/05/2025

CVE-2025-4058

Publication date:
29/04/2025
A vulnerability classified as critical has been found in Projectworlds Online Examination System 1.0. This affects an unknown part of the file /Bloodgroop_process.php. The manipulation of the argument Pat_BloodGroup1 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2025

CVE-2025-4059

Publication date:
29/04/2025
A vulnerability classified as critical was found in code-projects Prison Management System 1.0. This vulnerability affects the function addrecord of the component Prison_Mgmt_Sys. The manipulation of the argument filename leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2025

CVE-2024-58099

Publication date:
29/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame<br /> <br /> Andrew and Nikolay reported connectivity issues with Cilium&amp;#39;s service<br /> load-balancing in case of vmxnet3.<br /> <br /> If a BPF program for native XDP adds an encapsulation header such as<br /> IPIP and transmits the packet out the same interface, then in case<br /> of vmxnet3 a corrupted packet is being sent and subsequently dropped<br /> on the path.<br /> <br /> vmxnet3_xdp_xmit_frame() which is called e.g. via vmxnet3_run_xdp()<br /> through vmxnet3_xdp_xmit_back() calculates an incorrect DMA address:<br /> <br /> page = virt_to_page(xdpf-&gt;data);<br /> tbi-&gt;dma_addr = page_pool_get_dma_addr(page) +<br /> VMXNET3_XDP_HEADROOM;<br /> dma_sync_single_for_device(&amp;adapter-&gt;pdev-&gt;dev,<br /> tbi-&gt;dma_addr, buf_size,<br /> DMA_TO_DEVICE);<br /> <br /> The above assumes a fixed offset (VMXNET3_XDP_HEADROOM), but the XDP<br /> BPF program could have moved xdp-&gt;data. While the passed buf_size is<br /> correct (xdpf-&gt;len), the dma_addr needs to have a dynamic offset which<br /> can be calculated as xdpf-&gt;data - (void *)xdpf, that is, xdp-&gt;data -<br /> xdp-&gt;data_hard_start.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025