Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-63466

Publication date:
31/10/2025
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the password parameter in the sub_426EF8 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-12554

Publication date:
31/10/2025
Missing Security Headers.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: MEDIUM
Last modification:
10/11/2025

CVE-2025-12553

Publication date:
31/10/2025
Email Server Certificate Verification Disabled.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: CRITICAL
Last modification:
10/11/2025

CVE-2025-12507

Publication date:
31/10/2025
The service Bizerba Communication Server (BCS) has an unquoted service path. Due to the way Windows searches the executable for the BCS service, malicious programs can be executed.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-12508

Publication date:
31/10/2025
When using domain users as BRAIN2 users, communication with Active Directory services is unencrypted. This can lead to the interception of authentication data and compromise confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-12509

Publication date:
31/10/2025
On a client with an admin user, a Global_Shipping script can be implemented. The script could later be executed on the BRAIN2 server with administrator rights.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-12552

Publication date:
31/10/2025
Insufficient Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Severity CVSS v4.0: MEDIUM
Last modification:
10/11/2025

CVE-2025-12357

Publication date:
31/10/2025
By manipulating the Signal Level Attenuation Characterization (SLAC) <br /> protocol with spoofed measurements, an attacker can stage a <br /> man-in-the-middle attack between an electric vehicle and chargers that <br /> comply with the ISO 15118-2 part. This vulnerability may be exploitable <br /> wirelessly, within close proximity, via electromagnetic induction.
Severity CVSS v4.0: HIGH
Last modification:
04/11/2025

CVE-2025-64389

Publication date:
31/10/2025
The web server of the device performs exchanges of sensitive information in clear text through an insecure protocol.
Severity CVSS v4.0: HIGH
Last modification:
04/11/2025

CVE-2025-61427

Publication date:
31/10/2025
A reflected cross-site scripting (XSS) vulnerability in BEO GmbH BEO Atlas Einfuhr Ausfuhr 3.0 allows attackers to execute arbitrary code in the context of a user&amp;#39;s browser via injecting a crafted payload into the userid and password parameters.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64168

Publication date:
31/10/2025
Agno is a multi-agent framework, runtime and control plane. From 2.0.0 to before 2.2.2, under high concurrency, when session_state is passed to Agent or Team during run or arun calls, a race condition can occur, causing a session_state to be assigned and persisted to the incorrect session. This may result in user data from one session being exposed to another user. This has been patched in version 2.2.2.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64385

Publication date:
31/10/2025
The equipment initially can be configured using the manufacturer&amp;#39;s application, by Wi-Fi, by the web server or with the manufacturer’s software.<br /> Using the manufacturer&amp;#39;s software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device&amp;#39;s MAC without the need for authentication.
Severity CVSS v4.0: CRITICAL
Last modification:
04/11/2025