Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-41107

Publication date:
10/11/2025
Stored Cross Site Scripting (XSS) vulnerability in Smart School 7.0 due to lack of proper validation of user input when sending a POST request to '/online_admission', wich affects the parameters 'firstname', 'lastname', 'guardian_name' and others. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal his/her session cookie details.
Severity CVSS v4.0: MEDIUM
Last modification:
14/11/2025

CVE-2025-12155

Publication date:
10/11/2025
A Command Injection vulnerability, resulting from improper file path sanitization (Directory Traversal) in Looker allows an attacker with Developer permission to execute arbitrary shell commands when a user is deleted on the host system.<br /> <br /> Looker-hosted and Self-hosted were found to be vulnerable.<br /> This issue has already been mitigated for Looker-hosted instances. No user action is required for these.<br /> <br /> Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.<br /> The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :<br /> * 24.12.100+<br /> * 24.18.192+<br /> * 25.0.69+<br /> * 25.6.57+<br /> * 25.8.39+<br /> * 25.10.22+
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-12397

Publication date:
10/11/2025
A SQL injection vulnerability was found in Looker Studio.<br /> <br /> A Looker Studio user with report view access could inject malicious SQL that would execute with the report owner&amp;#39;s permissions. The vulnerability affected to reports with BigQuery as the data source.<br /> <br /> This vulnerability was patched on 21 July 2025, and no customer action is needed.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-41731

Publication date:
10/11/2025
A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-12933

Publication date:
10/11/2025
A vulnerability was identified in SourceCodester Baby Care System 1.0. This affects an unknown part of the file /updatewelcome.php?id=siteoptions&amp;action=welcome. Such manipulation of the argument roleid leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Severity CVSS v4.0: MEDIUM
Last modification:
17/11/2025

CVE-2025-62689

Publication date:
10/11/2025
NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
Severity CVSS v4.0: HIGH
Last modification:
14/11/2025

CVE-2025-59777

Publication date:
10/11/2025
NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
Severity CVSS v4.0: HIGH
Last modification:
14/11/2025

CVE-2025-12931

Publication date:
10/11/2025
A vulnerability was found in SourceCodester Food Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/edit-orders.php. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.
Severity CVSS v4.0: MEDIUM
Last modification:
12/11/2025

CVE-2025-12932

Publication date:
10/11/2025
A vulnerability was determined in SourceCodester Baby Care System 1.0. Affected by this issue is some unknown functionality of the file /admin.php?id=inbox. This manipulation of the argument msgid causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Severity CVSS v4.0: MEDIUM
Last modification:
17/11/2025

CVE-2025-12613

Publication date:
10/11/2025
Versions of the package cloudinary before 2.7.0 are vulnerable to Arbitrary Argument Injection due to improper parsing of parameter values containing an ampersand. An attacker can inject additional, unintended parameters. This could lead to a variety of malicious outcomes, such as bypassing security checks, altering data, or manipulating the application&amp;#39;s behavior.<br /> <br /> **Note:**<br /> Following our established security policy, we attempted to contact the maintainer regarding this vulnerability, but haven&amp;#39;t received a response.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-12930

Publication date:
10/11/2025
A vulnerability has been found in SourceCodester Food Ordering System 1.0. Affected is an unknown function of the file /view-ticket.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
12/11/2025

CVE-2025-12867

Publication date:
10/11/2025
EIP Plus developed by Hundred Plus has an Arbitrary File Uplaod vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025