Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-56252

Publication date:
15/09/2025
Cross Site Scripting (xss) vulnerability in ServitiumCRM 2.10 allowing attackers to execute arbitrary code via a crafted URL to the mobile parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2025

CVE-2025-57248

Publication date:
15/09/2025
A null pointer dereference vulnerability was discovered in SumatraPDF 3.5.2 during the processing of a crafted .djvu file. When the file is opened, the application crashes inside libmupdf.dll, specifically in the DataPool::has_data() function.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2025

CVE-2025-58045

Publication date:
15/09/2025
Dataease is an open source data analytics and visualization platform. In Dataease versions up to 2.10.12, the patch introduced to mitigate DB2 JDBC deserialization remote code execution attacks only blacklisted the rmi parameter. The ldap parameter in the DB2 JDBC connection string was not filtered, allowing attackers to exploit the DB2 JDBC connection string to trigger server-side request forgery (SSRF). In higher versions of Java, ldap deserialization (autoDeserialize) is disabled by default, preventing remote code execution, but SSRF remains exploitable. Versions up to 2.10.12 are affected. The issue is fixed in version 2.10.13. Updating to 2.10.13 or later is recommended. No known workarounds are documented aside from upgrading.
Severity CVSS v4.0: HIGH
Last modification:
19/09/2025

CVE-2025-36082

Publication date:
15/09/2025
IBM OpenPages 9.0 and 9.1 allows web page cache to be stored locally which can be read by another user on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2025

CVE-2025-43793

Publication date:
15/09/2025
Liferay Portal 7.4.0 through 7.4.3.105, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions may incorrectly identify the subdomain of a domain name and create a supercookie, which allows remote attackers who control a website that share the same TLD to read cookies set by the application.
Severity CVSS v4.0: MEDIUM
Last modification:
16/12/2025

CVE-2025-10491

Publication date:
15/09/2025
The MongoDB Windows installation MSI may leave ACLs unset on custom installation directories allowing a local attacker to introduce executable code to MongoDB's process via DLL hijacking. This issue affects MongoDB Server v6.0 version prior to 6.0.25, MongoDB Server v7.0 version prior to 7.0.21 and MongoDB Server v8.0 version prior to 8.0.5
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2025

CVE-2025-6202

Publication date:
15/09/2025
Vulnerability in SK Hynix DDR5 on x86 allows a local attacker to trigger Rowhammer bit flips impacting the Hardware Integrity and the system's security. This issue affects DDR5: DIMMs produced from 2021-1 until 2024-12.
Severity CVSS v4.0: HIGH
Last modification:
15/09/2025

CVE-2025-8396

Publication date:
15/09/2025
Insufficiently specific bounds checking on authorization header could lead to denial of service in the Temporal server on all platforms due to excessive memory allocation.This issue affects all platforms and versions of OSS Server prior to 1.26.3, 1.27.3, and 1.28.1 (i.e., fixed in 1.26.3, 1.27.3, and 1.28.1 and later). Temporal Cloud services are not impacted.
Severity CVSS v4.0: MEDIUM
Last modification:
15/09/2025

CVE-2025-52053

Publication date:
15/09/2025
TOTOLINK X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_417D74 function via the file_name parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
20/09/2025

CVE-2025-10459

Publication date:
15/09/2025
A security flaw has been discovered in PHPGurukul Beauty Parlour Management System 1.1. This affects an unknown part of the file /admin/all-appointment.php. The manipulation of the argument delid results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
Severity CVSS v4.0: MEDIUM
Last modification:
02/10/2025

CVE-2023-53257

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mac80211: check S1G action frame size<br /> <br /> Before checking the action code, check that it even<br /> exists in the frame.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2026

CVE-2023-53258

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix possible underflow for displays with large vblank<br /> <br /> [Why]<br /> Underflow observed when using a display with a large vblank region<br /> and low refresh rate<br /> <br /> [How]<br /> Simplify calculation of vblank_nom<br /> <br /> Increase value for VBlankNomDefaultUS to 800us
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2026