Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-56301

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** An issue was discovered in Chipsalliance Rocket-Chip commit f517abbf41abb65cea37421d3559f9739efd00a9 (2025-01-29) allowing attackers to corrupt exception handling and privilege state transitions via a flawed interaction between exception handling and MRET return mechanisms in the CSR logic when an exception is triggered during MRET execution. The Control and Status Register (CSR) logic has a flawed interaction between exception handling and exception return (MRET) mechanisms which can cause faulty trap behavior. When the MRET instruction is executed in machine mode without being in an exception state, an Instruction Access Fault may be triggered. This results in both the exception handling logic and the exception return logic activating simultaneously, leading to conflicting updates to the control and status registers.
Gravedad CVSS v3.1: ALTA
Última modificación:
17/10/2025

CVE-2025-28016

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** A Reflected Cross-Site Scripting (XSS) vulnerability was found in loginsystem/edit-profile.php of the PHPGurukul User Registration & Login and User Management System V3.3. This vulnerability allows remote attackers to execute arbitrary JavaScript code via the fname, lname, and contact parameters.
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/10/2025

CVE-2025-11178

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42386.
Gravedad CVSS v3.1: ALTA
Última modificación:
02/10/2025

CVE-2025-9230

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Issue summary: An application trying to decrypt CMS messages encrypted using<br /> password based encryption can trigger an out-of-bounds read and write.<br /> <br /> Impact summary: This out-of-bounds read may trigger a crash which leads to<br /> Denial of Service for an application. The out-of-bounds write can cause<br /> a memory corruption which can have various consequences including<br /> a Denial of Service or Execution of attacker-supplied code.<br /> <br /> Although the consequences of a successful exploit of this vulnerability<br /> could be severe, the probability that the attacker would be able to<br /> perform it is low. Besides, password based (PWRI) encryption support in CMS<br /> messages is very rarely used. For that reason the issue was assessed as<br /> Moderate severity according to our Security Policy.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as the CMS implementation is outside the OpenSSL FIPS module<br /> boundary.
Gravedad CVSS v3.1: ALTA
Última modificación:
04/11/2025

CVE-2025-9231

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Issue summary: A timing side-channel which could potentially allow remote<br /> recovery of the private key exists in the SM2 algorithm implementation on 64 bit<br /> ARM platforms.<br /> <br /> Impact summary: A timing side-channel in SM2 signature computations on 64 bit<br /> ARM platforms could allow recovering the private key by an attacker..<br /> <br /> While remote key recovery over a network was not attempted by the reporter,<br /> timing measurements revealed a timing signal which may allow such an attack.<br /> <br /> OpenSSL does not directly support certificates with SM2 keys in TLS, and so<br /> this CVE is not relevant in most TLS contexts. However, given that it is<br /> possible to add support for such certificates via a custom provider, coupled<br /> with the fact that in such a custom provider context the private key may be<br /> recoverable via remote timing measurements, we consider this to be a Moderate<br /> severity issue.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as SM2 is not an approved algorithm.
Gravedad CVSS v3.1: MEDIA
Última modificación:
04/11/2025

CVE-2025-9232

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Issue summary: An application using the OpenSSL HTTP client API functions may<br /> trigger an out-of-bounds read if the &amp;#39;no_proxy&amp;#39; environment variable is set and<br /> the host portion of the authority component of the HTTP URL is an IPv6 address.<br /> <br /> Impact summary: An out-of-bounds read can trigger a crash which leads to<br /> Denial of Service for an application.<br /> <br /> The OpenSSL HTTP client API functions can be used directly by applications<br /> but they are also used by the OCSP client functions and CMP (Certificate<br /> Management Protocol) client implementation in OpenSSL. However the URLs used<br /> by these implementations are unlikely to be controlled by an attacker.<br /> <br /> In this vulnerable code the out of bounds read can only trigger a crash.<br /> Furthermore the vulnerability requires an attacker-controlled URL to be<br /> passed from an application to the OpenSSL function and the user has to have<br /> a &amp;#39;no_proxy&amp;#39; environment variable set. For the aforementioned reasons the<br /> issue was assessed as Low severity.<br /> <br /> The vulnerable code was introduced in the following patch releases:<br /> 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.<br /> <br /> The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br /> issue, as the HTTP client implementation is outside the OpenSSL FIPS module<br /> boundary.
Gravedad CVSS v3.1: MEDIA
Última modificación:
04/11/2025

CVE-2025-52043

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In Frappe ERPNext v15.57.5, the function import_coa() at erpnext/accounts/doctype/chart_of_accounts_importer/chart_of_accounts_importer.py is vulnerable to SQL injection, which allows an attacker to extract all information from databases by injecting a SQL query into the company parameter.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/10/2025

CVE-2025-52047

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In Frappe ErpNext v15.57.5, the function get_income_account() at erpnext/controllers/queries.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the filters.disabled parameter.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/10/2025

CVE-2025-52049

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In Frappe ErpNext v15.57.5, the function get_timesheet_detail_rate() at erpnext/projects/doctype/timesheet/timesheet.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting SQL query into the timelog parameter.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/10/2025

CVE-2025-52050

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In Frappe ERPNext 15.57.5, the function get_loyalty_program_details_with_points() at erpnext/accounts/doctype/loyalty_program/loyalty_program.py is vulnerable to SQL Injection, which allows an attacker to extract all information from databases by injecting a SQL query into the expiry_date parameter.
Gravedad CVSS v3.1: MEDIA
Última modificación:
03/10/2025

CVE-2025-34217

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) contain an undocumented &amp;#39;printerlogic&amp;#39; user with a hardcoded SSH public key in &amp;#39;~/.ssh/authorized_keys&amp;#39; and a sudoers rule granting the printerlogic_ssh group &amp;#39;NOPASSWD: ALL&amp;#39;. Possession of the matching private key gives an attacker root access to the appliance.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
07/10/2025

CVE-2025-11152

Fecha de publicación:
30/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** Sandbox escape due to integer overflow in the Graphics: Canvas2D component. This vulnerability affects Firefox
Gravedad CVSS v3.1: ALTA
Última modificación:
30/10/2025