Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-49656

Publication date:
21/07/2025
Users with administrator access can create databases files outside the files area of the Fuseki server.<br /> <br /> This issue affects Apache Jena version up to 5.4.0.<br /> <br /> Users are recommended to upgrade to version 5.5.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-50151

Publication date:
21/07/2025
File access paths in configuration files uploaded by users with administrator access are not validated.<br /> <br /> This issue affects Apache Jena version up to 5.4.0.<br /> <br /> Users are recommended to upgrade to version 5.5.0, which does not allow arbitrary configuration upload.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-41681

Publication date:
21/07/2025
A high privileged remote attacker can gain persistent XSS via POST requests due to improper neutralization of special elements used to create dynamic content.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-41679

Publication date:
21/07/2025
An unauthenticated remote attacker could exploit a buffer overflow vulnerability in the device causing a denial of service that affects only the network initializing wizard (Conftool) service.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-41678

Publication date:
21/07/2025
A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-41677

Publication date:
21/07/2025
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-mail action in fast succession.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-41676

Publication date:
21/07/2025
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-41675

Publication date:
21/07/2025
A high privileged remote attacker can execute arbitrary system commands via GET requests in the cloud server communication script due to improper neutralization of special elements used in an OS command.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-41674

Publication date:
21/07/2025
A high privileged remote attacker can execute arbitrary system commands via POST requests in the diagnostic action due to improper neutralization of special elements used in an OS command.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-41673

Publication date:
21/07/2025
A high privileged remote attacker can execute arbitrary system commands via POST requests in the send_sms action due to improper neutralization of special elements used in an OS command.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2025

CVE-2025-1469

Publication date:
21/07/2025
Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2024-6107

Publication date:
21/07/2025
Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the corresponding snaps.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2025