Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-48355

Publication date:
21/08/2025
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ProveSource LTD ProveSource Social Proof allows Retrieve Embedded Sensitive Data.This issue affects ProveSource Social Proof: from n/a through 3.0.5.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-27217

Publication date:
21/08/2025
A Server-Side Request Forgery (SSRF) in the UISP Application may allow a malicious actor with certain permissions to make requests outside of UISP Application scope.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-48978

Publication date:
21/08/2025
An Improper Input Validation in EdgeMAX EdgeSwitch (Version 1.11.0 and earlier) could allow a Command Injection by a malicious actor with access to EdgeSwitch adjacent network.<br /> <br /> Affected Products:<br /> <br /> EdgeMAX EdgeSwitch (Version 1.11.0 and earlier) <br /> <br /> <br /> <br /> Mitigation:<br /> <br /> Update the EdgeMAX EdgeSwitch to Version 1.11.1 or later.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-43300

Publication date:
21/08/2025
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-24285

Publication date:
21/08/2025
Multiple Improper Input Validation vulnerabilities in UniFi Connect EV Station Lite may allow a Command Injection by a malicious actor with network access to the UniFi Connect EV Station Lite.<br /> <br /> Affected Products:<br /> UniFi Connect EV Station Lite (Version 1.5.1 and earlier)<br /> <br /> Mitigation:<br /> Update UniFi Connect EV Station Lite to Version 1.5.2 or later
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-27213

Publication date:
21/08/2025
An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect devices to enable Android Debug Bridge (ADB) and make unsupported changes to the system.<br /> <br /> <br /> <br /> Affected Products:<br /> <br /> UniFi Connect EV Station Pro (Version 1.5.18 and earlier)<br /> UniFi Connect Display (Version 1.9.324 and earlier)<br /> UniFi Connect Display Cast (Version 1.9.301 and earlier)<br /> UniFi Connect Display Cast Pro (Version 1.0.78 and earlier)<br /> UniFi Connect Display Cast Lite (Version 1.0.3 and earlier)<br /> <br /> Mitigation:<br /> <br /> Update UniFi Connect EV Station Pro to Version 1.5.27 or later<br /> Update UniFi Connect Display to Version 1.13.6 or later<br /> Update UniFi Connect Display Cast to Version 1.10.3 or later<br /> Update UniFi Connect Display Cast Pro to Version 1.0.83 or later<br /> Update UniFi Connect Display Cast Lite to Version 1.1.3 or later
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-27214

Publication date:
21/08/2025
A Missing Authentication for Critical Function vulnerability in the UniFi Connect EV Station Pro may allow a malicious actor with physical or adjacent access to perform an unauthorized factory reset.<br /> <br /> <br /> <br /> Affected Products:<br /> <br /> UniFi Connect EV Station Pro (Version 1.5.18 and earlier)<br /> <br /> <br /> <br /> Mitigation:<br /> <br /> Update UniFi Connect EV Station Pro to Version 1.5.27 or later
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-27215

Publication date:
21/08/2025
An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect Display Cast devices to make unsupported changes to the system.<br /> <br /> <br /> <br /> Affected Products:<br /> <br /> UniFi Connect Display Cast (Version 1.10.3 and earlier)<br /> UniFi Connect Display Cast Pro (Version 1.0.89 and earlier)<br /> UniFi Connect Display Cast Lite (Version 1.0.3 and earlier)<br /> <br /> <br /> <br /> Mitigation:<br /> <br /> Update UniFi Connect Display Cast to Version 1.10.7 or later<br /> Update UniFi Connect Display Cast Pro to Version 1.0.94 or later<br /> Update UniFi Connect Display Cast Lite to Version 1.1.8 or later
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-27216

Publication date:
21/08/2025
Multiple Incorrect Permission Assignment for Critical Resource in UISP Application may allow a malicious actor with certain permissions to escalate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-9264

Publication date:
21/08/2025
A vulnerability was found in Xuxueli xxl-job up to 3.1.1. Affected by this issue is the function remove of the file /src/main/java/com/xxl/job/admin/controller/JobInfoController.java of the component Jobs Handler. Performing manipulation of the argument ID results in improper control of resource identifiers. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Severity CVSS v4.0: MEDIUM
Last modification:
11/09/2025

CVE-2025-9253

Publication date:
20/08/2025
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RP_doSpecifySiteSurvey of the file /goform/RP_doSpecifySiteSurvey. The manipulation of the argument ssidhex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
02/09/2025

CVE-2025-9262

Publication date:
20/08/2025
A flaw has been found in wong2 mcp-cli 1.13.0. Affected is the function redirectToAuthorization of the file /src/oauth/provider.js of the component oAuth Handler. This manipulation causes os command injection. The attack may be initiated remotely. The attack is considered to have high complexity. The exploitability is told to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
12/09/2025