Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-9919

Publication date:
03/09/2025
A vulnerability was identified in 1000projects Beauty Parlour Management System 1.0. This affects an unknown function of the file /admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Severity CVSS v4.0: MEDIUM
Last modification:
10/09/2025

CVE-2025-9920

Publication date:
03/09/2025
A security flaw has been discovered in Campcodes Recruitment Management System 1.0. This impacts the function include of the file /admin/index.php. The manipulation of the argument page results in file inclusion. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
Severity CVSS v4.0: MEDIUM
Last modification:
09/09/2025

CVE-2025-56435

Publication date:
03/09/2025
SQL Injection vulnerability in FoxCMS v1.2.6 and before allows a remote attacker to execute arbitrary code via the. file /DataBackup.php and the operation on the parameter id.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2025

CVE-2025-56498

Publication date:
03/09/2025
An OS command injection vulnerability exists in PLDT WiFi Router's Prolink PGN6401V Firmware 8.1.2 web management interface. The ping6.asp page submits user input to the /boaform/formPing6 endpoint via the pingAddr parameter, which is not properly sanitized. An authenticated attacker can exploit this flaw by injecting arbitrary system commands, which are executed by the underlying operating system with root privileges. The router uses the Boa web server (version 0.93.15) to handle the request. Successful exploitation can lead to full system compromise and unauthorized control of the network device.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2025

CVE-2025-55852

Publication date:
03/09/2025
Tenda AC8 v16.03.34.06 is vulnerable to Buffer Overflow in the formWifiBasicSet function via the parameter security or security_5g.
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2025-55944

Publication date:
03/09/2025
Slink v1.4.9 allows stored cross-site scripting (XSS) via crafted SVG uploads. When a user views the shared image in a new browser tab, the embedded JavaScript executes. The issue affects both authenticated and unauthenticated users.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2025

CVE-2025-48876

Publication date:
03/09/2025
Rejected reason: This CVE is a duplicate of another CVE.
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2025

CVE-2025-0280

Publication date:
03/09/2025
A security vulnerability in HCL Compass can allow attacker to gain unauthorized database access.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-9823

Publication date:
03/09/2025
SummaryA Cross-Site Scripting (XSS) vulnerability allows an attacker to execute arbitrary JavaScript in the context of another user’s session. This occurs because user-supplied input is reflected back in the server’s response without proper sanitization or escaping, potentially enabling malicious actions such as session hijacking, credential theft, or unauthorized actions in the application.<br /> <br /> DetailsThe vulnerability resides in the “Tags” input field on the /s/ajax?action=lead:addLeadTags endpoint. Although the server applies sanitization before storing the data or returning it later, the payload is executed immediately in the victim’s browser upon reflection, allowing an attacker to run arbitrary JavaScript in the user’s session.<br /> <br /> ImpactA Reflected XSS attack can have a significant impact, allowing attackers to steal sensitive user data like cookies, redirect users to malicious websites, manipulate the web page content, and essentially take control of a user&amp;#39;s session within an application by executing malicious JavaScript code within the victim&amp;#39;s browser, even if the server-side code is secure; essentially enabling them to perform actions as if they were the logged-in user.<br /> <br /> References * Web Security Academy: Cross-site scripting https://portswigger.net/web-security/cross-site-scripting <br /> * Web Security Academy: Reflected cross-site scripting https://portswigger.net/web-security/cross-site-scripting/reflected
Severity CVSS v4.0: MEDIUM
Last modification:
04/09/2025

CVE-2025-9824

Publication date:
03/09/2025
ImpactThe attacker can validate if a user exists by checking the time login returns. This timing difference can be used to enumerate valid usernames, after which an attacker could attempt brute force attacks.<br /> <br /> PatchesThis vulnerability has been patched, implementing a timing-safe form login authenticator that ensures consistent response times regardless of whether a user exists or not.<br /> <br /> Technical DetailsThe vulnerability was caused by different response times when:<br /> <br /> * A valid username was provided (password hashing occurred)<br /> * An invalid username was provided (no password hashing occurred)<br /> <br /> <br /> The fix introduces a TimingSafeFormLoginAuthenticator that performs a dummy password hash verification even for non-existent users, ensuring consistent timing.<br /> <br /> WorkaroundsNo workarounds are available. Users should upgrade to the patched version.<br /> <br /> References * https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/03-Identity_Management_Testing/04-Testing_for_Account_Enumeration_and_Guessable_User_Account
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-58643

Publication date:
03/09/2025
Deserialization of Untrusted Data vulnerability in enituretechnology LTL Freight Quotes – Daylight Edition allows Object Injection. This issue affects LTL Freight Quotes – Daylight Edition: from n/a through 2.2.7.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025

CVE-2025-58644

Publication date:
03/09/2025
Deserialization of Untrusted Data vulnerability in enituretechnology LTL Freight Quotes - TQL Edition allows Object Injection. This issue affects LTL Freight Quotes - TQL Edition: from n/a through 1.2.6.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2025