Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-20058

Publication date:
05/02/2025
When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Severity CVSS v4.0: HIGH
Last modification:
05/02/2025

CVE-2024-56131

Publication date:
05/02/2025
Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.<br /> <br /> This issue affects:<br /> <br /> <br /> <br />  Product <br /> <br /> <br /> <br /> <br /> <br /> Affected Versions <br /> <br /> <br /> <br /> <br /> <br /> LoadMaster <br /> <br /> <br /> <br /> <br /> <br /> From 7.2.55.0 to 7.2.60.1 (inclusive) <br /> <br /> <br /> <br /> <br /> <br />   <br /> <br /> <br /> <br /> <br /> <br /> From 7.2.49.0 to 7.2.54.12 (inclusive) <br /> <br /> <br /> <br /> <br /> <br />   <br /> <br /> <br /> <br /> <br /> <br /> 7.2.48.12 and all prior versions <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> Multi-Tenant Hypervisor <br /> <br /> <br /> <br /> <br /> <br /> 7.1.35.12 and all prior versions <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> ECS<br /> <br /> <br /> <br /> <br /> <br /> All prior versions to 7.2.60.1 (inclusive)
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2024-56132

Publication date:
05/02/2025
Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.<br /> <br /> This issue affects:<br /> <br /> <br /> <br />  Product <br /> <br /> <br /> <br /> <br /> <br /> Affected Versions <br /> <br /> <br /> <br /> <br /> <br /> LoadMaster <br /> <br /> <br /> <br /> <br /> <br /> From 7.2.55.0 to 7.2.60.1 (inclusive) <br /> <br /> <br /> <br /> <br /> <br />   <br /> <br /> <br /> <br /> <br /> <br /> From 7.2.49.0 to 7.2.54.12 (inclusive) <br /> <br /> <br /> <br /> <br /> <br />   <br /> <br /> <br /> <br /> <br /> <br /> 7.2.48.12 and all prior versions <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> ECS<br /> <br /> <br /> <br /> <br /> <br /> All prior versions to 7.2.60.1 (inclusive)
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2024-56133

Publication date:
05/02/2025
Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.<br /> <br /> This issue affects:<br /> <br /> <br /> <br />  Product <br /> <br /> <br /> <br /> <br /> <br /> Affected Versions <br /> <br /> <br /> <br /> <br /> <br /> LoadMaster <br /> <br /> <br /> <br /> <br /> <br /> From 7.2.55.0 to 7.2.60.1 (inclusive) <br /> <br /> <br /> <br /> <br /> <br />   <br /> <br /> <br /> <br /> <br /> <br /> From 7.2.49.0 to 7.2.54.12 (inclusive) <br /> <br /> <br /> <br /> <br /> <br />   <br /> <br /> <br /> <br /> <br /> <br /> 7.2.48.12 and all prior versions <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> ECS<br /> <br /> <br /> <br /> <br /> <br /> All prior versions to 7.2.60.1 (inclusive)
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2025-20207

Publication date:
05/02/2025
A vulnerability in Simple Network Management Protocol (SNMP) polling for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, remote attacker to obtain confidential information about the underlying operating system.<br /> <br /> This vulnerability exists because the appliances do not protect confidential information at rest in response to SNMP poll requests. An attacker could exploit this vulnerability by sending a crafted SNMP poll request to the affected appliance. A successful exploit could allow the attacker to discover confidential information that should be restricted. To exploit this vulnerability, an attacker must have the configured SNMP credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2025-20204

Publication date:
05/02/2025
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.&amp;nbsp;<br /> <br /> This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2025-20205

Publication date:
05/02/2025
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.&amp;nbsp;<br /> <br /> This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025

CVE-2025-20179

Publication date:
05/02/2025
A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.<br /> <br /> This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.<br /> Note:&amp;nbsp;Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2025-20180

Publication date:
05/02/2025
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.<br /> <br /> This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2025-20183

Publication date:
05/02/2025
A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint.&amp;nbsp;<br /> <br /> The vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2025-20184

Publication date:
05/02/2025
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.<br /> <br /> This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025

CVE-2025-20185

Publication date:
05/02/2025
A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.<br /> <br /> This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.<br /> Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
05/02/2025