Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-34403

Publication date:
13/02/2025
Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to this pins and get access to internal network. A race condition can be acquired and attacker can spoof “UserData” with desirable file path and access it though backup on USB.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2023-34404

Publication date:
13/02/2025
Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to these pins and get access to internal network. As a result, by accessing a specific port an attacker can send call request to all registered services in router and achieve command injection vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2023-34406

Publication date:
13/02/2025
An issue was discovered on Mercedes Benz NTG 6. A possible integer overflow exists in the user data import/export function of NTG (New Telematics Generation) 6 head units. To perform this attack, local access to USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2024-12054

Publication date:
13/02/2025
ZF Roll Stability Support Plus (RSSPlus) <br /> is vulnerable to an authentication bypass vulnerability targeting <br /> deterministic RSSPlus SecurityAccess service seeds, which may allow an <br /> attacker to remotely (proximal/adjacent with RF equipment or via pivot <br /> from J2497 telematics devices) call diagnostic functions intended for <br /> workshop or repair scenarios. This can impact system availability, <br /> potentially degrading performance or erasing software, however the <br /> vehicle remains in a safe vehicle state.
Severity CVSS v4.0: MEDIUM
Last modification:
13/02/2025

CVE-2023-34401

Publication date:
13/02/2025
Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside profile folder there is a file, which is encoded with proprietary UD2 codec. Due to missed size checks in the enapsulate file, attacker can achieve Out-of-Bound Read in heap memory.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2025-25195

Publication date:
13/02/2025
Zulip is an open source team chat application. A weekly cron job (added in 50256f48314250978f521ef439cafa704e056539) demotes channels to being "inactive" after they have not received traffic for 180 days. However, upon doing so, an event was sent to all users in the organization, not just users in the channel. This event contained the name of the private channel. Similarly, the same commit (50256f48314250978f521ef439cafa704e056539) added functionality to notify clients when channels stopped being "inactive." The first message sent to a private channel which had not previously had any messages for over 180 days (and were thus already marked "inactive") would leak an event to all users in the organization; this event also contained the name of the private channel. Commits 75be449d456d29fef27e9d1828bafa30174284b4 and a2a1a7f8d152296c8966f1380872c0ac69e5c87e fixed the issue. This vulnerability only existed in `main`, and was not part of any published versions.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2025

CVE-2025-25281

Publication date:
13/02/2025
An attacker may modify the URL to discover sensitive information about the target network.
Severity CVSS v4.0: HIGH
Last modification:
10/04/2025

CVE-2025-26473

Publication date:
13/02/2025
The Mojave Inverter uses the GET method for sensitive information.
Severity CVSS v4.0: HIGH
Last modification:
19/03/2025

CVE-2025-23421

Publication date:
13/02/2025
An attacker could obtain firmware files and reverse engineer their <br /> intended use leading to loss of confidentiality and integrity of the <br /> hardware devices enabled by the Qardio iOS and Android applications.
Severity CVSS v4.0: MEDIUM
Last modification:
13/02/2025

CVE-2025-24836

Publication date:
13/02/2025
With a specially crafted Python script, an attacker could send <br /> continuous startMeasurement commands over an unencrypted Bluetooth <br /> connection to the affected device. This would prevent the device from <br /> connecting to a clinician&amp;#39;s app to take patient readings and ostensibly <br /> flood it with requests, resulting in a denial-of-service condition.
Severity CVSS v4.0: MEDIUM
Last modification:
13/02/2025

CVE-2025-24861

Publication date:
13/02/2025
An attacker may inject commands via specially-crafted post requests.
Severity CVSS v4.0: HIGH
Last modification:
04/03/2025

CVE-2025-24865

Publication date:
13/02/2025
The administrative web interface of <br /> mySCADA myPRO Manager<br /> <br /> can be accessed without authentication <br /> which could allow an unauthorized attacker to retrieve sensitive <br /> information and upload files without the associated password.
Severity CVSS v4.0: CRITICAL
Last modification:
04/03/2025