Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-6785

Publication date:
04/09/2025
Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle.  Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44.
Severity CVSS v4.0: MEDIUM
Last modification:
04/09/2025

CVE-2025-8311

Publication date:
04/09/2025
dotCMS versions 24.03.22 and after, identified a Boolean-based blind SQLi vulnerability in the /api/v1/contenttype endpoint. This endpoint uses the sites query parameter, which accepts a comma-separated list of site identifiers or keys.<br /> <br /> The vulnerability was triggered via the sites parameter, which was directly concatenated into a SQL query without proper sanitization. <br /> <br /> Exploitation allowed an authenticated attacker with low privileges to extract data from database, perform privilege escalation, or trigger denial-of-service conditions. <br /> <br /> The vulnerability was verified using tools such as SQLMap and confirmed to allow full database exfiltration and potential denial-of-service conditions via crafted payloads.<br /> <br /> The vulnerability is fixed in the following versions of dotCMS stack: 25.08.14 / 25.07.10-1v2 LTS / 24.12.27v10 LTS / 24.04.24v21 LTS
Severity CVSS v4.0: CRITICAL
Last modification:
11/09/2025

CVE-2025-2667

Publication date:
04/09/2025
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 could disclose sensitive system information about the server to a privileged user that could aid in further attacks against the system.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2025

CVE-2025-2694

Publication date:
04/09/2025
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2025

CVE-2025-25048

Publication date:
04/09/2025
IBM Jazz Foundation 7.0.2 through 7.0.2 iFix033, 7.0.3 through 7.0.3 iFix012, and 7.1.0 through 7.1.0 iFix002 could allow an authenticated user to upload files to the system due to improper neutralization of sequences that can resolve to a restricted directory.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2024-43184

Publication date:
04/09/2025
IBM Jazz Foundation 7.0.2 through 7.0.2 iFix033, 7.0.3 through 7.0.3 iFix012, and 7.1.0 through 7.1.0 iFix002 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2025-57263

Publication date:
04/09/2025
An authenticated SQL injection vulnerability in VX Guestbook 1.07 allows attackers with admin access to inject malicious SQL payloads via the "word" POST parameter in the words.php admin panel.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2025

CVE-2025-7385

Publication date:
04/09/2025
Input from search query parameter in GOV CMS is not sanitized properly, leading to a Blind SQL injection vulnerability, which might be exploited by an unauthenticated remote attacker. <br /> <br /> Versions 4.0 and above are not affected.
Severity CVSS v4.0: CRITICAL
Last modification:
04/09/2025

CVE-2025-7388

Publication date:
04/09/2025
It was possible to perform Remote Command Execution (RCE) via Java<br /> RMI interface in the OpenEdge AdminServer, allowing authenticated users to inject and<br /> execute OS commands under the delegated authority of the AdminServer process.  An RMI interface permitted manipulation of a configuration<br /> property with inadequate input validation leading to OS command injection.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-41063

Publication date:
04/09/2025
A vulnerability has been discovered in version 4.0.5 of appRain CMF, consisting of an authenticated reflected XSS due to a lack of proper validation of user input, through the &amp;#39;s&amp;#39; parameter in /apprain/developer/debug-log/db.
Severity CVSS v4.0: MEDIUM
Last modification:
04/09/2025

CVE-2025-41062

Publication date:
04/09/2025
A vulnerability has been discovered in version 4.0.5 of appRain CMF, consisting of an authenticated reflected XSS due to a lack of proper validation of user input, through the &amp;#39;page&amp;#39; parameter in /apprain/developer/addons.
Severity CVSS v4.0: MEDIUM
Last modification:
04/09/2025

CVE-2025-41061

Publication date:
04/09/2025
A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the &amp;#39;data[Addon][layouts]&amp;#39; and &amp;#39;data[Addon][layouts_except]&amp;#39; parameters in /apprain/developer/addons/update/uploadify.
Severity CVSS v4.0: MEDIUM
Last modification:
04/09/2025