Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-48929

Publication date:
28/05/2025
The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2025

CVE-2025-48930

Publication date:
28/05/2025
The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2025

CVE-2025-48928

Publication date:
28/05/2025
The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2025-48931

Publication date:
28/05/2025
The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2025-5257

Publication date:
28/05/2025
SummaryThis advisory addresses a security vulnerability in Mautic where unpublished page previews could be accessed by unauthenticated users and potentially indexed by search engines. This could lead to the unintended disclosure of draft content or sensitive information.<br /> <br /> Unauthorized Access to Unpublished Page Previews: The page preview functionality for unpublished content, accessible via predictable URLs (e.g., /page/preview/1, /page/preview/2), lacked proper authorization checks. This allowed any unauthenticated user to view content that was not yet intended for public release, and allowed search engines to index these private preview URLs, making the content publicly discoverable.<br /> MitigationMautic has patched this vulnerability by enforcing proper permission checks on preview pages. Users should upgrade to the patched version of Mautic or later.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2025-48746

Publication date:
28/05/2025
Netwrix Directory Manager (formerly Imanami GroupID) v.11.0.0.0 and before, as well as after v.11.1.25134.03 lacks Authentication for a Critical Function.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-48925

Publication date:
28/05/2025
The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2025

CVE-2025-48926

Publication date:
28/05/2025
The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2025

CVE-2025-48927

Publication date:
28/05/2025
The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2025-36572

Publication date:
28/05/2025
Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of Hard-coded Credentials vulnerability in the PowerStore image file. A low privileged attacker with remote access, with the knowledge of the hard-coded credentials, could potentially exploit this vulnerability to gain unauthorized access based on the hardcoded account&amp;#39;s privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2025

CVE-2024-47056

Publication date:
28/05/2025
SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.<br /> <br /> Sensitive Information Disclosure via .env File Exposure: The .env file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.<br /> <br /> MitigationUpdate Mautic to the latest Mautic version.<br /> <br /> By default, Mautic does not use .env files for production data.<br /> <br /> For Apache users: Ensure your web server is configured to respect .htaccess files.<br /> <br /> For Nginx users: As Nginx does not inherently support .htaccess files, you must manually add a configuration block to your Nginx server configuration to deny access to .env files. Add the following to your Nginx configuration for the Mautic site:<br /> <br /> location ~ /\.env {<br /> deny all;<br /> }<br /> <br /> <br /> <br /> <br /> <br /> After modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2025-32801

Publication date:
28/05/2025
Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.<br /> This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025