Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-4241

Publication date:
03/05/2025
A vulnerability classified as critical has been found in PHPGurukul Teacher Subject Allocation Management System 1.0. Affected is an unknown function of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/05/2025

CVE-2025-4240

Publication date:
03/05/2025
A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. This issue affects some unknown processing of the component LCD Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/05/2025

CVE-2025-4238

Publication date:
03/05/2025
A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as critical. This affects an unknown part of the component MGET Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/05/2025

CVE-2025-4239

Publication date:
03/05/2025
A vulnerability was found in PCMan FTP Server 2.0.7. It has been declared as critical. This vulnerability affects unknown code of the component TYPE Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/05/2025

CVE-2025-1495

Publication date:
03/05/2025
IBM Business Automation Workflow 24.0.0 and 24.0.1 through 24.0.1 IF001 Center may leak sensitive information due to missing authorization validation.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2025

CVE-2024-41753

Publication date:
03/05/2025
IBM Cloud Pak for Business Automation 24.0.0 through 24.0.0 IF004 and 24.0.1 through 24.0.1 IF001 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2025

CVE-2024-58134

Publication date:
03/05/2025
Mojolicious versions from 0.999922 through 9.39 for Perl uses a hard coded string, or the application&amp;#39;s class name, as a HMAC session secret by default.<br /> <br /> These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2025

CVE-2025-4237

Publication date:
03/05/2025
A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this issue is some unknown functionality of the component MDELETE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/05/2025

CVE-2025-4236

Publication date:
03/05/2025
A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this vulnerability is an unknown functionality of the component MDIR Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
03/05/2025

CVE-2025-37799

Publication date:
03/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp<br /> <br /> vmxnet3 driver&amp;#39;s XDP handling is buggy for packet sizes using ring0 (that<br /> is, packet sizes between 128 - 3k bytes).<br /> <br /> We noticed MTU-related connectivity issues with Cilium&amp;#39;s service load-<br /> balancing in case of vmxnet3 as NIC underneath. A simple curl to a HTTP<br /> backend service where the XDP LB was doing IPIP encap led to overly large<br /> packet sizes but only for *some* of the packets (e.g. HTTP GET request)<br /> while others (e.g. the prior TCP 3WHS) looked completely fine on the wire.<br /> <br /> In fact, the pcap recording on the backend node actually revealed that the<br /> node with the XDP LB was leaking uninitialized kernel data onto the wire<br /> for the affected packets, for example, while the packets should have been<br /> 152 bytes their actual size was 1482 bytes, so the remainder after 152 bytes<br /> was padded with whatever other data was in that page at the time (e.g. we<br /> saw user/payload data from prior processed packets).<br /> <br /> We only noticed this through an MTU issue, e.g. when the XDP LB node and<br /> the backend node both had the same MTU (e.g. 1500) then the curl request<br /> got dropped on the backend node&amp;#39;s NIC given the packet was too large even<br /> though the IPIP-encapped packet normally would never even come close to<br /> the MTU limit. Lowering the MTU on the XDP LB (e.g. 1480) allowed to let<br /> the curl request succeed (which also indicates that the kernel ignored the<br /> padding, and thus the issue wasn&amp;#39;t very user-visible).<br /> <br /> Commit e127ce7699c1 ("vmxnet3: Fix missing reserved tailroom") was too eager<br /> to also switch xdp_prepare_buff() from rcd-&gt;len to rbi-&gt;len. It really needs<br /> to stick to rcd-&gt;len which is the actual packet length from the descriptor.<br /> The latter we also feed into vmxnet3_process_xdp_small(), by the way, and<br /> it indicates the correct length needed to initialize the xdp-&gt;{data,data_end}<br /> parts. For e127ce7699c1 ("vmxnet3: Fix missing reserved tailroom") the<br /> relevant part was adapting xdp_init_buff() to address the warning given the<br /> xdp_data_hard_end() depends on xdp-&gt;frame_sz. With that fixed, traffic on<br /> the wire looks good again.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2025-4226

Publication date:
03/05/2025
A vulnerability classified as critical has been found in PHPGurukul Cyber Cafe Management System 1.0. This affects an unknown part of the file /add-computer.php. The manipulation of the argument compname/comploc leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
05/05/2025

CVE-2024-58135

Publication date:
03/05/2025
Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets.<br /> <br /> When creating a default app with the "mojo generate app" tool, a weak secret is written to the application&amp;#39;s configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application&amp;#39;s sessions. This may allow an attacker to brute force the application&amp;#39;s session keys.
Severity CVSS v4.0: Pending analysis
Last modification:
03/05/2025