Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-7303

Publication date:
07/05/2025
A vulnerability, which was classified as problematic, was found in q2apro q2apro-on-site-notifications up to 1.4.6. This affects the function process_request of the file q2apro-onsitenotifications-page.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The patch is named 0ca85ca02f8aceb661e9b71fd229c45d388ea5b5. It is recommended to upgrade the affected component.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-4043

Publication date:
07/05/2025
An admin user can gain unauthorized write access to the /etc/rc.local file on the device, which is executed on a system boot.
Severity CVSS v4.0: MEDIUM
Last modification:
23/06/2025

CVE-2025-31177

Publication date:
07/05/2025
gnuplot is affected by a heap buffer overflow at function utf8_copy_one.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-3925

Publication date:
07/05/2025
BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or <br /> series 5 prior to v9.0.166 contain an execution with unnecessary <br /> privileges vulnerability, allowing for privilege escalation on the <br /> device once code execution has been obtained.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-45514

Publication date:
07/05/2025
Tenda FH451 V1.0.0.9 has a stack overflow vulnerability in the function.frmL7ImForm.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2025

CVE-2025-3272

Publication date:
07/05/2025
Incorrect Authorization vulnerability in OpenText™ Operations Bridge Manager. <br /> <br /> The vulnerability could allow authenticated users to change their password without providing their old password.<br /> <br /> This issue affects Operations Bridge Manager: 24.2, 24.4.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-3476

Publication date:
07/05/2025
Incorrect Authorization vulnerability in OpenText™ Operations Bridge Manager. The vulnerability could allows privilege escalation by authenticated users.This issue affects Operations Bridge Manager: 2023.05, 23.4, 24.2, 24.4.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-45388

Publication date:
07/05/2025
Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes. NOTE: this is disputed by the Supplier because "It has been well documented that when serving uploaded files using a method outside of Wagtail (which admittedly is the default), it requires additional configuration from the developer, because Wagtail cannot control how these are served. ... For example, if a Wagtail instance is configured to upload files into AWS S3, Wagtail cannot control the permissions on how they&amp;#39;re served, nor any headers used when serving them (a limitation of S3)."
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-29746

Publication date:
07/05/2025
Cross Site Scripting vulnerability in Koillection v.1.6.10 allows a remote attacker to escalate privileges via the collection, Wishlist and album components
Severity CVSS v4.0: Pending analysis
Last modification:
16/06/2025

CVE-2025-26168

Publication date:
07/05/2025
IXON VPN Client before 1.4.4 on Linux and macOS allows Local Privilege Escalation to root because there is code execution from a configuration file that can be controlled by a low-privileged user. There is a race condition in which a temporary configuration file, in a world-writable directory, can be overwritten.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-26169

Publication date:
07/05/2025
IXON VPN Client before 1.4.4 on Windows allows Local Privilege Escalation to SYSTEM because there is code execution from a configuration file that can be controlled by a low-privileged user. There is a race condition in which a temporary configuration file, in a world-writable directory, can be overwritten.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-30147

Publication date:
07/05/2025
Besu Native contains scripts and tooling that is used to build and package the native libraries used by the Ethereum client Hyperledger Besu. Besu 24.7.1 through 25.2.2, corresponding to besu-native versions 0.9.0 through 1.2.1, have a potential consensus bug for the precompiles ALTBN128_ADD (0x06), ALTBN128_MUL (0x07), and ALTBN128_PAIRING (0x08). These precompiles were reimplemented in besu-native using gnark-crypto&amp;#39;s bn254 implementation, as the former implementation used a library which was no longer maintained and not sufficiently performant. The new gnark implementation was initially added in version 0.9.0 of besu-native but was not utilized by Besu until version 0.9.2 in Besu 24.7.1. The issue is that there are EC points which may be crafted which are in the correct subgroup but are not on the curve and the besu-native gnark implementation was relying on subgroup checks to perform point-on-curve checks as well. The version of gnark-crypto used at the time did not do this check when performing subgroup checks. The result is that it was possible for Besu to give an incorrect result and fall out of consensus when executing one of these precompiles against a specially crafted input point. Additionally, homogenous Besu-only networks can potentially enshrine invalid state which would be incorrect and difficult to process with patched versions of besu which handle these calls correctly. The underlying defect has been patched in besu-native release 1.3.0. The fixed version of Besu is version 25.3.0. As a workaround for versions of Besu with the problem, the native precompile for altbn128 may be disabled in favor of the pure-java implementation. The pure java implementation is significantly slower, but does not have this consensus issue.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026