Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-25251

Publication date:
28/05/2025
An Incorrect Authorization vulnerability [CWE-863] in FortiClient Mac 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 may allow a local attacker to escalate privileges via crafted XPC messages.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2025-27526

Publication date:
28/05/2025
Deserialization of Untrusted Data vulnerability in Apache InLong.<br /> <br /> This issue affects Apache InLong: from 1.13.0 through 2.1.0. This vulnerability which can lead to JDBC Vulnerability URLEncdoe and backspace bypass. Users are advised to upgrade to Apache InLong&amp;#39;s 2.2.0 or cherry-pick [1] to solve it.<br /> <br /> [1]  https://github.com/apache/inlong/pull/11747
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2025-27528

Publication date:
28/05/2025
Deserialization of Untrusted Data vulnerability in Apache InLong.<br /> <br /> This issue affects Apache InLong: from 1.13.0 through 2.1.0. <br /> <br /> This<br /> vulnerability allows attackers to bypass the security mechanisms of InLong<br /> JDBC and leads to arbitrary file reading. Users are advised to upgrade to Apache InLong&amp;#39;s 2.2.0 or cherry-pick [1] to solve it.<br /> <br /> [1] https://github.com/apache/inlong/pull/11747
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2025

CVE-2025-24473

Publication date:
28/05/2025
A exposure of sensitive system information to an unauthorized control sphere vulnerability in Fortinet FortiClientWindows 7.2.0 through 7.2.1, FortiClientWindows 7.0.13 through 7.0.14 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connections to port 8053 (non-default setup)
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-27522

Publication date:
28/05/2025
Deserialization of Untrusted Data vulnerability in Apache InLong.<br /> <br /> This issue affects Apache InLong: from 1.13.0 through 2.1.0. This vulnerability is a secondary mining bypass for CVE-2024-26579. Users are advised to upgrade to Apache InLong&amp;#39;s 2.2.0 or cherry-pick [1] to solve it.<br /> <br /> [1] <br /> <br /> https://github.com/apache/inlong/pull/11732
Severity CVSS v4.0: Pending analysis
Last modification:
28/01/2026

CVE-2024-54020

Publication date:
28/05/2025
A missing authorization in Fortinet FortiManager versions 7.2.0 through 7.2.1, and versions 7.0.0 through 7.0.7 may allow an authenticated attacker to overwrite global threat feeds via crafted update requests.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2025-4009

Publication date:
28/05/2025
The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product<br /> features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.<br /> <br /> This web interface has two endpoints that are vulnerable to arbitrary command injection (CVE-2025-4009, CVE-2025-10364) and the authentication mechanism has a flaw leading to authentication bypass (CVE-2025-10365).<br /> <br /> CVE-2025-4009 covers the command injection in feature-transfer-import.php<br /> CVE-2025-10364 covers the command injection in feature-transfer-export.php<br /> <br /> Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.<br /> <br /> This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.
Severity CVSS v4.0: CRITICAL
Last modification:
12/09/2025

CVE-2025-4947

Publication date:
28/05/2025
libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2025

CVE-2025-5025

Publication date:
28/05/2025
libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2025

CVE-2025-4800

Publication date:
28/05/2025
The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site&amp;#39;s server, which may make remote code execution possible.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2025-48846

Publication date:
28/05/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025

CVE-2025-48847

Publication date:
28/05/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2025