Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-32432

Publication date:
25/04/2025
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2025

CVE-2025-3634

Publication date:
25/04/2025
A security vulnerability was discovered in Moodle that allows students to enroll themselves in courses without completing all the necessary safety checks. Specifically, users can sign up for courses prematurely, even if they haven't finished two-step verification processes.
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-28354

Publication date:
25/04/2025
An issue in the Printer Manager Systm of Entrust Corp Printer Manager D3.18.4-3 and below allows attackers to execute a directory traversal via a crafted POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2024-57375

Publication date:
25/04/2025
Andamiro Pump It Up 20th Anniversary (aka Double X or XX/2019) 1.00.0-2.08.3 allows a physically proximate attacker to cause a denial of service (application crash) via certain deselect actions.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2024-6199

Publication date:
25/04/2025
An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem.<br /> <br /> Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
Severity CVSS v4.0: HIGH
Last modification:
29/04/2025

CVE-2024-6198

Publication date:
25/04/2025
The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker<br /> with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.
Severity CVSS v4.0: HIGH
Last modification:
29/04/2025

CVE-2025-2986

Publication date:
25/04/2025
IBM Maximo Asset Management 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
13/08/2025

CVE-2025-3912

Publication date:
25/04/2025
The WS Form LITE – Drag &amp; Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the &amp;#39;get_config&amp;#39; function in all versions up to, and including, 1.10.35. This makes it possible for unauthenticated attackers to read the value of the plugin&amp;#39;s settings, including API keys for integrated services.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2024-11917

Publication date:
25/04/2025
The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.9.2. This is due to improper configurations in the &amp;#39;jobsearch_xing_response_data_callback&amp;#39;, &amp;#39;set_access_tokes&amp;#39;, and &amp;#39;google_callback&amp;#39; functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2025

CVE-2025-2470

Publication date:
25/04/2025
The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the &amp;#39;nsl_registration_store_extra_input&amp;#39; function. This makes it possible for unauthenticated attackers to register an account on the site with an arbitrary role, including Administrator, when registering via a social login. The Nextend Social Login plugin must be installed and configured to exploit the vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2025-1565

Publication date:
25/04/2025
The Mayosis Core plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.4.1 via the library/wave-audio/peaks/remote_dl.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2025-1279

Publication date:
25/04/2025
The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ux_cb_tools_import_item_ajax AJAX action in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025