Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-53458

Publication date:
05/03/2025
Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2025

CVE-2025-20206

Publication date:
05/03/2025
A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client.<br /> <br /> This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system.
Severity CVSS v4.0: Pending analysis
Last modification:
22/07/2025

CVE-2025-20208

Publication date:
05/03/2025
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. <br /> <br /> This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2025

CVE-2024-11035

Publication date:
05/03/2025
Carbon Black Cloud Windows Sensor, prior to 4.0.3, may be susceptible to an Information Leak vulnerability, which s a type of issue whereby sensitive information may b exposed due to a vulnerability in software.
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2025

CVE-2025-27411

Publication date:
05/03/2025
REDAXO is a PHP-based CMS. In Redaxo before 5.18.3, the mediapool/media page is vulnerable to arbitrary file upload. This vulnerability is fixed in 5.18.3.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2025

CVE-2025-27412

Publication date:
05/03/2025
REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to Reflected cross-site scripting (XSS) on the page of AddOns. This vulnerability is fixed in 5.18.3.
Severity CVSS v4.0: Pending analysis
Last modification:
01/07/2025

CVE-2025-27497

Publication date:
05/03/2025
OpenDJ is an LDAPv3 compliant directory service. OpenDJ prior to 4.9.3 contains a denial-of-service (DoS) vulnerability that causes the server to become unresponsive to all LDAP requests without crashing or restarting. This issue occurs when an alias loop exists in the LDAP database. If an ldapsearch request is executed with alias dereferencing set to "always" on this alias entry, the server stops responding to all future requests. Fortunately, the server can be restarted without data corruption. This vulnerability is fixed in 4.9.3.
Severity CVSS v4.0: HIGH
Last modification:
05/03/2025

CVE-2025-24521

Publication date:
05/03/2025
External XML entity injection allows arbitrary download of files. The <br /> score without least privilege principle violation is as calculated <br /> below. In combination with other issues it may facilitate further <br /> compromise of the device. Remediation in Version 6.8.0, release date: <br /> 01-Mar-25.
Severity CVSS v4.0: MEDIUM
Last modification:
05/03/2025

CVE-2025-23416

Publication date:
05/03/2025
Path traversal may lead to arbitrary file deletion. The score without <br /> least privilege principle violation is as calculated below. In <br /> combination with other issues it may facilitate further compromise of <br /> the device. Remediation in Version 6.8.0, release date: 01-Mar-25.
Severity CVSS v4.0: MEDIUM
Last modification:
05/03/2025

CVE-2025-24494

Publication date:
05/03/2025
Path traversal may allow remote code execution using privileged account <br /> (requires device admin account, cannot be performed by a regular user). <br /> In combination with the &amp;#39;Upload&amp;#39; functionality this could be used to <br /> execute an arbitrary script or possibly an uploaded binary. Remediation <br /> in Version 6.7.0, release date: 20-Oct-24.
Severity CVSS v4.0: HIGH
Last modification:
05/03/2025

CVE-2023-38693

Publication date:
05/03/2025
Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid web application development. The Lucee REST endpoint is vulnerable to RCE via an XML XXE attack. This vulnerability is fixed in Lucee 5.4.3.2, 5.3.12.1, 5.3.7.59, 5.3.8.236, and 5.3.9.173.
Severity CVSS v4.0: Pending analysis
Last modification:
05/03/2025

CVE-2025-21095

Publication date:
05/03/2025
Path traversal may lead to arbitrary file download. The score without <br /> least privilege principle violation is as calculated below. In <br /> combination with other issues it may facilitate further compromise of <br /> the device. Remediation in Version 6.8.0, release date: 01-Mar-25.
Severity CVSS v4.0: MEDIUM
Last modification:
05/03/2025