Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-11761

Publication date:
03/11/2025
A potential security vulnerability has been identified in the HP Client Management Script Library software, which might allow escalation of privilege during the installation process. HP is releasing software updates to mitigate the potential vulnerability.
Severity CVSS v4.0: HIGH
Last modification:
21/01/2026

CVE-2025-8900

Publication date:
03/11/2025
The Doccure Core plugin for WordPress is vulnerable to privilege escalation in versions up to, and excluding, 1.5.4. This is due to the plugin allowing users who are registering new accounts to set their own role or by supplying 'user_type' field. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-63442

Publication date:
03/11/2025
Simple User Management System with PHP-MySQL v1.0 is vulnerable to Cross-Site Scripting (XSS) via the Profile Section. The system fails to properly sanitize user input, allowing attackers to inject and execute arbitrary JavaScript when the input is displayed in the browser
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-63443

Publication date:
03/11/2025
School Management System PHP v1.0 is vulnerable to Cross Site Scripting (XSS) in /login.php via the password parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2025-60892

Publication date:
03/11/2025
An issue in Raspberry Pi Imager version 1.9.6 for Windows, affecting its OS customization feature. The imager's 'public-key authentication' setting unintentionally re-adds a user's id_rsa.pub key from their local Windows machine to the authorized_keys file on the Raspberry Pi, even after the user explicitly deletes the key from the user interface. This creates an unintended attack surface, as it could allow an attacker to use a different key than the intended one to login to the device.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-29699

Publication date:
03/11/2025
NetSurf 3.11 is vulnerable to Use After Free in dom_node_set_text_content function.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-45663

Publication date:
03/11/2025
An issue in NetSurf v3.11 causes the application to read uninitialized heap memory when creating a dom_event structure.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2024-51317

Publication date:
03/11/2025
An issue in NetSurf v.3.11 allows a remote attacker to execute arbitrary code via the dom_node_normalize function
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-64294

Publication date:
03/11/2025
Missing Authorization vulnerability in d3wp WP Snow Effect wp-snow-effect allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Snow Effect: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2025-40107

Publication date:
03/11/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled<br /> <br /> This issue is similar to the vulnerability in the `mcp251x` driver,<br /> which was fixed in commit 03c427147b2d ("can: mcp251x: fix resume from<br /> sleep before interface was brought up").<br /> <br /> In the `hi311x` driver, when the device resumes from sleep, the driver<br /> schedules `priv-&gt;restart_work`. However, if the network interface was<br /> not previously enabled, the `priv-&gt;wq` (workqueue) is not allocated and<br /> initialized, leading to a null pointer dereference.<br /> <br /> To fix this, we move the allocation and initialization of the workqueue<br /> from the `hi3110_open` function to the `hi3110_can_probe` function.<br /> This ensures that the workqueue is properly initialized before it is<br /> used during device resume. And added logic to destroy the workqueue<br /> in the error handling paths of `hi3110_can_probe` and in the<br /> `hi3110_can_remove` function to prevent resource leaks.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-12626

Publication date:
03/11/2025
A security flaw has been discovered in jeecgboot jeewx-boot up to 641ab52c3e1845fec39996d7794c33fb40dad1dd. This affects the function getImgUrl of the file WxActGoldeneggsPrizesController.java. Performing manipulation of the argument imgurl results in path traversal. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The root cause was initially fixed but can be evaded with additional encoding.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2025-0987

Publication date:
03/11/2025
Authorization Bypass Through User-Controlled Key vulnerability in CB Project Ltd. Co. CVLand allows Parameter Injection.This issue affects CVLand: from 2.1.0 through 20251103. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026