Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-63432

Publication date:
24/11/2025
Xtooltech Xtool AnyScan Android Application 4.40.40 and prior is Missing SSL Certificate Validation. The application fails to properly validate the TLS certificate from its update server. An attacker on the same network can exploit this vulnerability by performing a Man-in-the-Middle (MITM) attack to intercept, decrypt, and modify traffic between the application and the update server. This serves as the basis for further attacks, including Remote Code Execution.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-13594

Publication date:
24/11/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-13511

Publication date:
24/11/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-60917

Publication date:
24/11/2025
A reflected cross-site scripting (XSS) vulnerability in the /overview/network/ endpoint of Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload into the color parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-60914

Publication date:
24/11/2025
Incorrect access control in Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to access sensitive information via sending a crafted GET request to the /display_logo endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-60915

Publication date:
24/11/2025
An issue in the size query parameter (/views/file.py) of Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to execute a path traversal via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-60633

Publication date:
24/11/2025
An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attacker to cause a denial of service via the Nudm_SubscriberDataManagement API.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-60638

Publication date:
24/11/2025
An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attacker to cause a denial of service via crafted POST request to the Nnssf_NSSAIAvailability API.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-60916

Publication date:
24/11/2025
A reflected cross-site scripting (XSS) vulnerability in the /overview/network/ endpoint of Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload into the charge parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-56423

Publication date:
24/11/2025
An issue in Austrian Academy of Sciences (AW) Austrian Archaeological Institute OpenAtlas v.8.12.0 allows a remote attacker to obtain sensitive information via the login error messages
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-60632

Publication date:
24/11/2025
An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attacker to cause a denial of service via crafted POST request to the Npcf_BDTPolicyControl API.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025

CVE-2025-40213

Publication date:
24/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete<br /> <br /> There is a BUG: KASAN: stack-out-of-bounds in set_mesh_sync due to<br /> memcpy from badly declared on-stack flexible array.<br /> <br /> Another crash is in set_mesh_complete() due to double list_del via<br /> mgmt_pending_valid + mgmt_pending_remove.<br /> <br /> Use DEFINE_FLEX to declare the flexible array right, and don&amp;#39;t memcpy<br /> outside bounds.<br /> <br /> As mgmt_pending_valid removes the cmd from list, use mgmt_pending_free,<br /> and also report status on error.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2025