Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-47813

Publication date:
10/07/2025
loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-43394

Publication date:
10/07/2025
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via <br /> mod_rewrite or apache expressions that pass unvalidated request input.<br /> <br /> This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.<br /> <br /> Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. <br /> <br /> The server offers limited protection against administrators directing the server to open UNC paths.<br /> Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-47252

Publication date:
10/07/2025
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.<br /> <br /> In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-23048

Publication date:
10/07/2025
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.<br /> <br /> Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-47811

Publication date:
10/07/2025
In Wing FTP Server through 7.4.4, the administrative web interface (listening by default on port 5466) runs as root or SYSTEM by default. The web application itself offers several legitimate ways to execute arbitrary system commands (i.e., through the web console or the task scheduler), and they are automatically executed in the highest possible privilege context. Because administrative users of the web interface are not necessarily also system administrators, one might argue that this is a privilege escalation. (If a privileged application role is not available to an attacker, CVE-2025-47812 can be leveraged.) NOTE: the vendor reportedly considers this behavior "fine to keep."
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-27889

Publication date:
10/07/2025
Wing FTP Server before 7.4.4 does not properly validate and sanitize the url parameter of the downloadpass.html endpoint, allowing injection of an arbitrary link. If a user clicks a crafted link, this discloses a cleartext password to the attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-42516

Publication date:
10/07/2025
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.<br /> <br /> This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.<br /> <br /> Users are recommended to upgrade to version 2.4.64, which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2024-43204

Publication date:
10/07/2025
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.<br /> <br /> Users are recommended to upgrade to version 2.4.64 which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-6395

Publication date:
10/07/2025
A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). When it reads certain settings from a template file, it can allow an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial of service (DoS) that could crash the system.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-46788

Publication date:
10/07/2025
Improper certificate validation in Zoom Workplace for Linux before version 6.4.13 may allow an unauthorized user to conduct an information disclosure via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-46789

Publication date:
10/07/2025
Classic buffer overflow in certain Zoom Clients for Windows may allow an authorized user to conduct a denial of service via network access.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-53364

Publication date:
10/07/2025
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Starting in 5.3.0 and before 7.5.3 and 8.2.2, the Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface. This vulnerability is fixed in 7.5.3 and 8.2.2.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025