Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-27140

Publication date:
24/02/2025
WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue.
Severity CVSS v4.0: CRITICAL
Last modification:
28/02/2025

CVE-2024-57608

Publication date:
24/02/2025
An issue in Via Browser 6.1.0 allows a a remote attacker to execute arbitrary code via the mark.via.Shell component.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-26533

Publication date:
24/02/2025
An SQL injection risk was identified in the module list filter within course search.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2025-27137

Publication date:
24/02/2025
Dependency-Track is a component analysis platform that allows organizations to identify and reduce risk in the software supply chain. Dependency-Track allows users with the `SYSTEM_CONFIGURATION` permission to customize notification templates. Templates are evaluated using the Pebble template engine. Pebble supports an `include` tag, which allows template authors to include the content of arbitrary files upon evaluation. Prior to version 4.12.6, users of Dependency-Track with the `SYSTEM_CONFIGURATION` permission can abuse the `include` tag by crafting notification templates that `include` sensitive local files, such as `/etc/passwd` or `/proc/1/environ`. By configuring such a template for a notification rule (aka "Alert"), and having it send notifications to a destination controlled by the actor, sensitive information may be leaked. The issue has been fixed in Dependency-Track 4.12.6. In fixed versions, the `include` tag can no longer be used. Usage of the tag will cause template evaluation to fail. As a workaround, avoid assigning the `SYSTEM_CONFIGURATION` permission to untrusted users. The `SYSTEM_CONFIGURATION` permission per default is only granted to members of the `Administrators` team. Assigning this permission to non-administrative users or teams is a security risk in itself, and highly discouraged.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-26532

Publication date:
24/02/2025
Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2025-26525

Publication date:
24/02/2025
Insufficient sanitizing in the TeX notation filter resulted in an <br /> arbitrary file read risk on sites where pdfTeX is available (such as <br /> those with TeX Live installed).
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-26526

Publication date:
24/02/2025
Separate Groups mode restrictions were not factored into permission <br /> checks before allowing viewing or deletion of responses in Feedback <br /> activities.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-26527

Publication date:
24/02/2025
Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-26528

Publication date:
24/02/2025
The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-26529

Publication date:
24/02/2025
Description information displayed in the site administration live log <br /> required additional sanitizing to prevent a stored XSS risk.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-26530

Publication date:
24/02/2025
The question bank filter required additional sanitizing to prevent a reflected XSS risk.
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2025

CVE-2025-26531

Publication date:
24/02/2025
Insufficient capability checks made it possible to disable badges a user does not have permission to access.
Severity CVSS v4.0: Pending analysis
Last modification:
07/08/2025