Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-12508

Publication date:
31/10/2025
When using domain users as BRAIN2 users, communication with Active Directory services is unencrypted. This can lead to the interception of authentication data and compromise confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-12509

Publication date:
31/10/2025
On a client with an admin user, a Global_Shipping script can be implemented. The script could later be executed on the BRAIN2 server with administrator rights.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-12552

Publication date:
31/10/2025
Insufficient Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: MEDIUM
Last modification:
10/11/2025

CVE-2025-12357

Publication date:
31/10/2025
By manipulating the Signal Level Attenuation Characterization (SLAC) <br /> protocol with spoofed measurements, an attacker can stage a <br /> man-in-the-middle attack between an electric vehicle and chargers that <br /> comply with the ISO 15118-2 part. This vulnerability may be exploitable <br /> wirelessly, within close proximity, via electromagnetic induction.
Severity CVSS v4.0: HIGH
Last modification:
04/11/2025

CVE-2025-64389

Publication date:
31/10/2025
The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol.
Severity CVSS v4.0: HIGH
Last modification:
04/11/2025

CVE-2025-61427

Publication date:
31/10/2025
A reflected cross-site scripting (XSS) vulnerability in BEO GmbH BEO Atlas Einfuhr Ausfuhr 3.0 allows attackers to execute arbitrary code in the context of a user&amp;#39;s browser via injecting a crafted payload into the userid and password parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64168

Publication date:
31/10/2025
Agno is a multi-agent framework, runtime and control plane. From 2.0.0 to before 2.2.2, under high concurrency, when session_state is passed to Agent or Team during run or arun calls, a race condition can occur, causing a session_state to be assigned and persisted to the incorrect session. This may result in user data from one session being exposed to another user. This has been patched in version 2.2.2.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64385

Publication date:
31/10/2025
The equipment initially can be configured using the manufacturer&amp;#39;s application, by Wi-Fi, by the web server or with the manufacturer’s software.<br /> Using the manufacturer&amp;#39;s software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device&amp;#39;s MAC without the need for authentication.
Severity CVSS v4.0: CRITICAL
Last modification:
04/11/2025

CVE-2025-64387

Publication date:
31/10/2025
The web application is vulnerable to a so-called ‘clickjacking’ attack. In this type of attack, the vulnerable page is inserted into a page controlled by the attacker in order to deceive the victim. This deception can range from making the victim click on a button to making them enter their login credentials in a form that, a priori, appears legitimate.
Severity CVSS v4.0: MEDIUM
Last modification:
04/11/2025

CVE-2025-64388

Publication date:
31/10/2025
Denial of service of the web server through specific requests to this protocol
Severity CVSS v4.0: CRITICAL
Last modification:
04/11/2025

CVE-2025-60749

Publication date:
31/10/2025
DLL Hijacking vulnerability in Trimble SketchUp desktop 2025 via crafted libcef.dll used by sketchup_webhelper.exe.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-57108

Publication date:
31/10/2025
Kitware VTK (Visualization Toolkit) through 9.5.0 contains a heap use-after-free vulnerability in vtkGLTFDocumentLoader. The vulnerability manifests during mesh object copy operations where vector members are accessed after the underlying memory has been freed, specifically when handling GLTF files with corrupted or invalid mesh reference structures.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025