Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-32802

Publication date:
28/05/2025
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.<br /> This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
Severity CVSS v4.0: Pending analysis
Last modification:
29/05/2025

CVE-2022-26037

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-26056

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-26072

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-26304

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-26424

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-25868

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-25870

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-25909

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2022-24067

Publication date:
28/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2025-45343

Publication date:
28/05/2025
An issue in Tenda W18E v.2.0 v.16.01.0.11 allows an attacker to execute arbitrary code via the editing functionality of the account module in the goform/setmodules route.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2024-51453

Publication date:
28/05/2025
IBM Sterling Secure Proxy 6.2.0.0 through 6.2.0.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2025