Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-5054

Publication date:
30/05/2025
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces.<br /> <br /> <br /> <br /> <br /> When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2025

CVE-2025-5357

Publication date:
30/05/2025
A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component PWD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-48887

Publication date:
30/05/2025
vLLM, an inference and serving engine for large language models (LLMs), has a Regular Expression Denial of Service (ReDoS) vulnerability in the file `vllm/entrypoints/openai/tool_parsers/pythonic_tool_parser.py` of versions 0.6.4 up to but excluding 0.9.0. The root cause is the use of a highly complex and nested regular expression for tool call detection, which can be exploited by an attacker to cause severe performance degradation or make the service unavailable. The pattern contains multiple nested quantifiers, optional groups, and inner repetitions which make it vulnerable to catastrophic backtracking. Version 0.9.0 contains a patch for the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/06/2025

CVE-2025-5356

Publication date:
30/05/2025
A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component BYE Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
24/06/2025

CVE-2024-42190

Publication date:
30/05/2025
HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a DLL hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-42191

Publication date:
30/05/2025
HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a COM hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-23589

Publication date:
30/05/2025
Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-13916

Publication date:
30/05/2025
An application "com.pri.applock", which is pre-loaded on Kruger&amp;Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.<br /> Exposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider&amp;#39;s public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code.<br /> <br /> Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. <br /> Application update was released in April 2025.
Severity CVSS v4.0: MEDIUM
Last modification:
10/06/2025

CVE-2024-13917

Publication date:
30/05/2025
An application "com.pri.applock", which is pre-loaded on Kruger&amp;Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.<br /> Exposed ”com.pri.applock.LockUI“ activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting CVE-2024-13916) or ask the user to provide it.<br /> <br /> Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. <br /> Application update was released in April 2025.
Severity CVSS v4.0: HIGH
Last modification:
10/06/2025

CVE-2024-13915

Publication date:
30/05/2025
Android based smartphones from vendors such as Ulefone and Krüger&amp;Matz contain "com.pri.factorytest" application preloaded onto devices during manufacturing process.<br /> The application "com.pri.factorytest" (version name: 1.0, version code: 1) exposes a ”com.pri.factorytest.emmc.FactoryResetService“ service allowing any application to perform a factory reset of the device. <br /> Application update did not increment the APK version. Instead, it was bundled in OS builds released later than December 2024 (Ulefone) and April 2025 (Krüger&amp;Matz).
Severity CVSS v4.0: MEDIUM
Last modification:
10/06/2025

CVE-2025-4985

Publication date:
30/05/2025
A stored Cross-site Scripting (XSS) vulnerability affecting Risk Management in Project Portfolio Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user&amp;#39;s browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-4986

Publication date:
30/05/2025
A stored Cross-site Scripting (XSS) vulnerability affecting Model Definition in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user&amp;#39;s browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025