Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-15359

Publication date:
30/12/2025
DVP-12SE11T - Out-of-bound memory write Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2025

CVE-2025-15242

Publication date:
30/12/2025
A vulnerability was detected in PHPEMS up to 11.0. The impacted element is an unknown function of the component Coupon Handler. Performing manipulation results in race condition. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is regarded as difficult. The exploit is now public and may be used.
Severity CVSS v4.0: LOW
Last modification:
30/12/2025

CVE-2025-15102

Publication date:
30/12/2025
DVP-12SE11T - Password Protection Bypass
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2025

CVE-2025-15103

Publication date:
30/12/2025
DVP-12SE11T - Authentication Bypass via Partial Password Disclosure
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2025

CVE-2025-15234

Publication date:
30/12/2025
A weakness has been identified in Tenda M3 1.0.0.13(4903). Impacted is the function formSetRemoteInternetLanInfo of the file /goform/setInternetLanInfo. This manipulation of the argument portIp/portMask/portGateWay/portDns/portSecDns causes heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
Severity CVSS v4.0: HIGH
Last modification:
30/12/2025

CVE-2025-15241

Publication date:
30/12/2025
A security vulnerability has been detected in CloudPanel Community Edition up to 2.5.1. The affected element is an unknown function of the file /admin/users of the component HTTP Header Handler. Such manipulation of the argument Referer leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.5.2 is sufficient to fix this issue. Upgrading the affected component is recommended.
Severity CVSS v4.0: MEDIUM
Last modification:
30/12/2025

CVE-2025-15358

Publication date:
30/12/2025
DVP-12SE11T - Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2025

CVE-2025-15232

Publication date:
30/12/2025
A vulnerability was identified in Tenda M3 1.0.0.13(4903). This vulnerability affects the function formSetAdPushInfo of the file /goform/setAdPushInfo. The manipulation of the argument mac/terminal leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Severity CVSS v4.0: HIGH
Last modification:
30/12/2025

CVE-2025-15233

Publication date:
30/12/2025
A security flaw has been discovered in Tenda M3 1.0.0.13(4903). This issue affects the function formSetAdInfoDetails of the file /goform/setAdInfoDetail. The manipulation of the argument adName/smsPassword/smsAccount/weixinAccount/weixinName/smsSignature/adRedirectUrl/adCopyRight/smsContent/adItemUID results in heap-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
Severity CVSS v4.0: HIGH
Last modification:
30/12/2025

CVE-2025-15355

Publication date:
30/12/2025
ISOinsight developed by NetVision Information has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
Severity CVSS v4.0: MEDIUM
Last modification:
30/12/2025

CVE-2025-15231

Publication date:
30/12/2025
A vulnerability was determined in Tenda M3 1.0.0.13(4903). This affects the function formSetRemoteVlanInfo of the file /goform/setVlanInfo. Executing manipulation of the argument ID/vlan/port can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Severity CVSS v4.0: HIGH
Last modification:
30/12/2025

CVE-2025-15230

Publication date:
30/12/2025
A vulnerability was found in Tenda M3 1.0.0.13(4903). Affected by this issue is the function formSetVlanPolicy of the file /goform/setVlanPolicyData. Performing manipulation of the argument qvlan_truck_port results in heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Severity CVSS v4.0: HIGH
Last modification:
30/12/2025