Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-25783

Publication date:
26/02/2025
An arbitrary file upload vulnerability in the component admin\plugin.php of Emlog Pro v2.5.3 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2025

CVE-2025-25784

Publication date:
26/02/2025
An arbitrary file upload vulnerability in the component \c\TemplateController.php of Jizhicms v2.5.4 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2025-25785

Publication date:
26/02/2025
JizhiCMS v2.5.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component \c\PluginsController.php. This vulnerability allows attackers to perform an intranet scan via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2025

CVE-2025-25789

Publication date:
26/02/2025
FoxCMS v1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the index() method at \controller\Sitemap.php.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-25790

Publication date:
26/02/2025
An arbitrary file upload vulnerability in the component \controller\LocalTemplate.php of FoxCMS v1.2.5 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-1249

Publication date:
26/02/2025
Missing Authorization vulnerability in Pixelite Events Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Events Manager: from n/a through 6.6.4.1.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2025-1716

Publication date:
26/02/2025
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
Severity CVSS v4.0: MEDIUM
Last modification:
29/12/2025

CVE-2024-52925

Publication date:
26/02/2025
In OPSWAT MetaDefender Kiosk before 4.7.0, arbitrary code execution can be performed by an attacker via the MD Kiosk Unlock Device feature for software encrypted USB drives.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2022-49732

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sock: redo the psock vs ULP protection check<br /> <br /> Commit 8a59f9d1e3d4 ("sock: Introduce sk-&gt;sk_prot-&gt;psock_update_sk_prot()")<br /> has moved the inet_csk_has_ulp(sk) check from sk_psock_init() to<br /> the new tcp_bpf_update_proto() function. I&amp;#39;m guessing that this<br /> was done to allow creating psocks for non-inet sockets.<br /> <br /> Unfortunately the destruction path for psock includes the ULP<br /> unwind, so we need to fail the sk_psock_init() itself.<br /> Otherwise if ULP is already present we&amp;#39;ll notice that later,<br /> and call tcp_update_ulp() with the sk_proto of the ULP<br /> itself, which will most likely result in the ULP looping<br /> its callbacks.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2025

CVE-2025-0719

Publication date:
26/02/2025
IBM Cloud Pak for Data 4.0.0 through 4.8.5 and 5.0.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2025

CVE-2025-26925

Publication date:
26/02/2025
Cross-Site Request Forgery (CSRF) vulnerability in Required Admin Menu Manager allows Cross Site Request Forgery.This issue affects Admin Menu Manager: from n/a through 1.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025

CVE-2025-0731

Publication date:
26/02/2025
An unauthenticated remote attacker can upload a .aspx file instead of a PV system picture through the demo account. The code can only be executed in the security context of the user.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2025