Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-28089

Publication date:
28/03/2025
maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2025-28090

Publication date:
28/03/2025
maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2024-58128

Publication date:
28/03/2025
In MISP before 2.4.193, menu_custom_right_link parameters can be set via the UI (i.e., without using the CLI) and thus attackers with admin privileges can conduct XSS attacks via a global menu link.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025

CVE-2024-58129

Publication date:
28/03/2025
In MISP before 2.4.193, menu_custom_right_link_html parameters can be set via the UI (i.e., without using the CLI) and thus attackers with admin privileges can conduct XSS attacks against every page.
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025

CVE-2024-58130

Publication date:
28/03/2025
In app/Controller/Component/RestResponseComponent.php in MISP before 2.4.193, REST endpoints have a lack of sanitization for non-JSON responses.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2025

CVE-2024-23338

Publication date:
28/03/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-53427. Reason: This candidate is a duplicate of CVE-2024-53427. Notes: All CVE users should reference CVE-2024-53427 instead of this candidate.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2025-2927

Publication date:
28/03/2025
A vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been classified as critical. Affected is an unknown function of the file /parameter/getFileTypeList.jsp. The manipulation of the argument typename leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
01/04/2025

CVE-2024-56975

Publication date:
28/03/2025
InvoicePlane (all versions tested as of December 2024) v.1.6.11 and before contains a remote code execution vulnerability in the upload_file method of the Upload controller.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2024-57083

Publication date:
28/03/2025
A prototype pollution in the component Module.mergeObjects (redoc/bundles/redoc.lib.js:2) of redoc
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2025-22953

Publication date:
28/03/2025
A SQL injection vulnerability exists in Epicor HCM 2021 1.9, with patches available: 5.16.0.1033/HCM2022, 5.17.0.1146/HCM2023, and 5.18.0.573/HCM2024. The injection is specifically in the filter parameter of the JsonFetcher.svc endpoint. An attacker can exploit this vulnerability by injecting malicious SQL payloads into the filter parameter, enabling the unauthorized execution of arbitrary SQL commands on the backend database. If certain features (like xp_cmdshell) are enabled, this may lead to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2025

CVE-2025-28254

Publication date:
28/03/2025
Cross Site Scripting vulnerability in Leantime v3.2.1 and before allows an authenticated attacker to execute arbitrary code and obtain sensitive information via the first name field in processMentions().
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2025-28256

Publication date:
28/03/2025
An issue in TOTOLINK A3100R V4.1.2cu.5247_B20211129 allows a remote attacker to execute arbitrary code via the setWebWlanIdx of the file /lib/cste_modules/wireless.so.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025