Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-25452

Publication date:
06/03/2025
An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the "/user" endpoint
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-25451

Publication date:
06/03/2025
An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a physically proximate attacker to escalate privileges via the "2fa_authorized" Local Storage key
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-25450

Publication date:
06/03/2025
An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the deactivation of the activated second factor to the /session endpoint
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-2029

Publication date:
06/03/2025
A vulnerability was found in MicroDicom DICOM Viewer 2025.1 Build 3321. It has been classified as critical. Affected is an unknown function of the file mDicom.exe. The manipulation leads to memory corruption. The attack needs to be approached locally. It is recommended to upgrade the affected component. The vendor quickly confirmed the existence of the vulnerability and fixed it in the latest beta.
Severity CVSS v4.0: MEDIUM
Last modification:
06/03/2025

CVE-2024-12146

Publication date:
06/03/2025
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Finder Fire Safety Finder ERP/CRM (New System) allows SQL Injection.This issue affects Finder ERP/CRM (New System): before 18.12.2024.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2025

CVE-2024-42844

Publication date:
06/03/2025
A SQL Injection vulnerability has been identified in EPICOR Prophet 21 (P21) up to 23.2.5232. This vulnerability allows authenticated remote attackers to execute arbitrary SQL commands through unsanitized user input fields to obtain unauthorized information
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2025-0877

Publication date:
06/03/2025
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AtaksAPP Reservation Management System allows Cross-Site Scripting (XSS).This issue affects Reservation Management System: before 4.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2024-12144

Publication date:
06/03/2025
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Finder Fire Safety Finder ERP/CRM (Old System) allows SQL Injection.This issue affects Finder ERP/CRM (Old System): before 18.12.2024.
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2024-13892

Publication date:
06/03/2025
Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. <br /> During the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.<br /> The vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well.
Severity CVSS v4.0: HIGH
Last modification:
03/10/2025

CVE-2024-13893

Publication date:
06/03/2025
Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.<br /> For the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created. <br /> Two products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.<br /> Newer firmware versions might be vulnerable as well.
Severity CVSS v4.0: HIGH
Last modification:
06/03/2025

CVE-2024-13894

Publication date:
06/03/2025
Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to path traversal. <br /> When an affected device is connected to a mobile app, it opens a port 10000 enabling a user to download pictures shot at specific moments by providing paths to the files. However, the directories to which a user has access are not limited, allowing for path traversal attacks and downloading sensitive information.<br /> The vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well.
Severity CVSS v4.0: MEDIUM
Last modification:
06/03/2025

CVE-2025-2045

Publication date:
06/03/2025
Improper authorization in GitLab EE affecting all versions from 17.7 prior to 17.7.6, 17.8 prior to 17.8.4, 17.9 prior to 17.9.1 allow users with limited permissions to access to potentially sensitive project analytics data.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025