Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-22170

Publication date:
22/10/2025
Jira Align is vulnerable to an authorization issue. A low-privilege user without sufficient privileges to perform an action could if they included a particular state-related parameter of a user with sufficient privileges to perform the action.
Severity CVSS v4.0: MEDIUM
Last modification:
24/10/2025

CVE-2025-22171

Publication date:
22/10/2025
Jira Align is vulnerable to an authorization issue. A low-privilege user is able to alter the private checklists of other users.
Severity CVSS v4.0: MEDIUM
Last modification:
24/10/2025

CVE-2025-22172

Publication date:
22/10/2025
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to read external reports without the required permission.
Severity CVSS v4.0: MEDIUM
Last modification:
24/10/2025

CVE-2025-22173

Publication date:
22/10/2025
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view certain sprint data without the required permission.
Severity CVSS v4.0: MEDIUM
Last modification:
24/10/2025

CVE-2025-22174

Publication date:
22/10/2025
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view portfolio rooms without the required permission.
Severity CVSS v4.0: MEDIUM
Last modification:
24/10/2025

CVE-2025-11957

Publication date:
22/10/2025
Improper authorization in the temporary access workflow of Devolutions Server 2025.2.12.0 and earlier allows an authenticated basic user to self-approve or approve the temporary access requests of other users and gain unauthorized access to vaults and entries via crafted API requests.
Severity CVSS v4.0: CRITICAL
Last modification:
25/11/2025

CVE-2025-11958

Publication date:
22/10/2025
An improper input validation in the Security Dashboard ignored-tasks API of Devolutions Server 2025.2.15.0 and earlier allows an authenticated user to cause a denial of service to the Security Dashboard via a crafted request.
Severity CVSS v4.0: MEDIUM
Last modification:
25/11/2025

CVE-2025-8677

Publication date:
22/10/2025
Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion.<br /> This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-60335

Publication date:
22/10/2025
A NULL pointer dereference in the main function of TOTOLINK N600R v4.3.0cu.7866_B20220506 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-60338

Publication date:
22/10/2025
Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the page parameter in the DhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2025

CVE-2025-62607

Publication date:
22/10/2025
Nautobot Single Source of Truth (SSoT) is an app for Nautobot. Prior to version 3.10.0, an unauthenticated attacker could access this page to view the Service Now public instance name e.g. companyname.service-now.com. This is considered low-value information. This does not expose the Secret, the Secret Name, or the Secret Value for the Username/Password for Service-Now.com. An unauthenticated member would not be able to change the instance name, nor set a Secret. There is not a way to gain access to other pages Nautobot through the unauthenticated Configuration page. This issue has been patched in version 3.10.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2025-62659

Publication date:
22/10/2025
Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in The Wikimedia Foundation MediaWiki CookieConsent extension allows Cross-Site Scripting (XSS).This issue affects MediaWiki CookieConsent extension: from v0.1.0 before v2.0.0.
Severity CVSS v4.0: LOW
Last modification:
22/10/2025