Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-27456

Publication date:
03/07/2025
The SMB server's login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27457

Publication date:
03/07/2025
All communication between the VNC server and client(s) is unencrypted. This allows an attacker to intercept the traffic and obtain sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27458

Publication date:
03/07/2025
The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27453

Publication date:
03/07/2025
The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2026

CVE-2025-1710

Publication date:
03/07/2025
The maxView Storage Manager does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27447

Publication date:
03/07/2025
The web application is susceptible to cross-site-scripting attacks. An attacker can create a prepared URL, which injects JavaScript code into the website. The code is executed in the victim’s browser when an authenticated administrator clicks the link.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27448

Publication date:
03/07/2025
The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboards can inject JavaScript code into the dashboard name which will be executed when the website is loaded.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27449

Publication date:
03/07/2025
The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27450

Publication date:
03/07/2025
The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-27451

Publication date:
03/07/2025
For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-1711

Publication date:
03/07/2025
Multiple services of the DUT as well as different scopes of the same service reuse the same credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
29/01/2026

CVE-2025-1709

Publication date:
03/07/2025
Several credentials for the local PostgreSQL database are stored in plain text (partially base64 encoded).
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026