Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-1960

Publication date:
12/03/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could cause an<br /> attacker to execute unauthorized commands when a system’s default password credentials have not been<br /> changed on first use. The default username is not displayed correctly in the WebHMI interface.
Severity CVSS v4.0: CRITICAL
Last modification:
13/03/2025

CVE-2025-1984

Publication date:
12/03/2025
Xerox Desktop Print Experience application contains a Local Privilege Escalation (LPE) vulnerability, which allows a low-privileged user to gain SYSTEM-level access.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2025-1683

Publication date:
12/03/2025
Improper link resolution before file access in the Nomad module of the 1E Client, in versions prior to 25.3, enables an attacker with local unprivileged access on a Windows system to delete arbitrary files on the device by exploiting symbolic links.
Severity CVSS v4.0: Pending analysis
Last modification:
30/01/2026

CVE-2025-2240

Publication date:
12/03/2025
A flaw was found in Smallrye, where smallrye-fault-tolerance is vulnerable to an out-of-memory (OOM) issue. This vulnerability is externally triggered when calling the metrics URI. Every call creates a new object within meterMap and may lead to a denial of service (DoS) issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2025

CVE-2025-29891

Publication date:
12/03/2025
Bypass/Injection vulnerability in Apache Camel.<br /> <br /> This issue affects Apache Camel: from 4.10.0 before 4.10.2, from 4.8.0 before 4.8.5, from 3.10.0 before 3.22.4.<br /> <br /> Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.<br /> <br /> This vulnerability is present in Camel&amp;#39;s default incoming header filter, that allows an attacker to include Camel specific headers that for some Camel components can alter the behaviours such as the camel-bean component, or the camel-exec component.<br /> <br /> If you have Camel applications that are directly connected to the internet via HTTP, then an attacker could include parameters in the HTTP requests that are sent to the Camel application that get translated into headers. <br /> <br /> The headers could be both provided as request parameters for an HTTP methods invocation or as part of the payload of the HTTP methods invocation.<br /> <br /> All the known Camel HTTP component such as camel-servlet, camel-jetty, camel-undertow, camel-platform-http, and camel-netty-http would be vulnerable out of the box.<br /> <br /> This CVE is related to the CVE-2025-27636: while they have the same root cause and are fixed with the same fix, CVE-2025-27636 was assumed to only be exploitable if an attacker could add malicious HTTP headers, while we have now determined that it is also exploitable via HTTP parameters. Like in CVE-2025-27636, exploitation is only possible if the Camel route uses particular vulnerable components.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2025-27914

Publication date:
12/03/2025
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A Reflected Cross-Site Scripting (XSS) vulnerability exists in the /h/rest endpoint, allowing authenticated attackers to inject and execute arbitrary JavaScript in a victim&amp;#39;s session. Exploitation requires a valid auth token and involves a crafted URL with manipulated query parameters that triggers XSS when accessed by a victim.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-27763

Publication date:
12/03/2025
XPixelGroup BasicSR through 1.4.2 might locally allow code execution in contrived situations where "scontrol show hostname" is executed in the presence of a crafted SLURM_NODELIST environment variable.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2025-22954

Publication date:
12/03/2025
GetLateOrMissingIssues in C4/Serials.pm in Koha before 24.11.02 allows SQL Injection in /serials/lateissues-export.pl via the supplierid or serialid parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2025-27915

Publication date:
12/03/2025
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary JavaScript within the victim&amp;#39;s session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim&amp;#39;s account, including e-mail redirection and data exfiltration.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-27794

Publication date:
12/03/2025
Flarum is open-source forum software. A session hijacking vulnerability exists in versions prior to 1.8.10 when an attacker-controlled authoritative subdomain under a parent domain (e.g., `subdomain.host.com`) sets cookies scoped to the parent domain (`.host.com`). This allows session token replacement for applications hosted on sibling subdomains (e.g., `community.host.com`) if session tokens aren&amp;#39;t rotated post-authentication. Key Constraints are that the attacker must control any subdomain under the parent domain (e.g., `evil.host.com` or `x.y.host.com`), and the parent domain must not be on the Public Suffix List. Due to non-existent session token rotation after authenticating we can theoretically reproduce the vulnerability by using browser dev tools, but due to the browser&amp;#39;s security measures this does not seem to be exploitable as described. Version 1.8.10 contains a patch for the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2025-25709

Publication date:
12/03/2025
An issue in dtp.ae tNexus Airport View v.2.8 allows a remote attacker to escalate privileges via the addUser and updateUser endpoints
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2025

CVE-2025-27788

Publication date:
12/03/2025
JSON is a JSON implementation for Ruby. Starting in version 2.10.0 and prior to version 2.10.2, a specially crafted document could cause an out of bound read, most likely resulting in a crash. Versions prior to 2.10.0 are not vulnerable. Version 2.10.2 fixes the problem. No known workarounds are available.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025