Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-51392

Publication date:
29/05/2025
An issue in OpenKnowledgeMaps Headstart v7 allows a remote attacker to escalate privileges via the url parameter of the getPDF.php component
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-48473

Publication date:
29/05/2025
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, when creating a conversation from a message in another conversation, there is no check to ensure that the user has the ability to view this message. Thus, the user can view arbitrary messages from other mailboxes or from other conversations to which they do not have access (access restriction to conversations is implemented by the show_only_assigned_conversations setting, which is also not checked). This issue has been patched in version 1.8.179.
Severity CVSS v4.0: MEDIUM
Last modification:
11/07/2025

CVE-2025-48474

Publication date:
29/05/2025
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application incorrectly checks user access rights for conversations. Users with show_only_assigned_conversations enabled can assign themselves to an arbitrary conversation from the mailbox to which they have access, thereby bypassing the restriction on viewing conversations. This issue has been patched in version 1.8.180.
Severity CVSS v4.0: MEDIUM
Last modification:
02/07/2025

CVE-2025-45474

Publication date:
29/05/2025
maccms10 v2025.1000.4047 is vulnerable to Server-side request forgery (SSRF) in Email Settings.
Severity CVSS v4.0: Pending analysis
Last modification:
19/06/2025

CVE-2025-48389

Publication date:
29/05/2025
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, FreeScout is vulnerable to deserialization of untrusted data due to insufficient validation. Through the set function, a string with a serialized object can be passed, and when getting an option through the get method, deserialization will occur, which will allow arbitrary code execution This issue has been patched in version 1.8.178.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-48390

Publication date:
29/05/2025
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, FreeScout is vulnerable to code injection due to insufficient validation of user input in the php_path parameter. The backticks characters are not removed, as well as tabulation is not removed. When checking user input, the file_exists function is also called to check for the presence of such a file (folder) in the file system. A user with the administrator role can create a translation for the language, which will create a folder in the file system. Further in tools.php, the user can specify the path to this folder as php_path, which will lead to the execution of code in backticks. This issue has been patched in version 1.8.178.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-48471

Publication date:
29/05/2025
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, the application does not check or performs insufficient checking of files uploaded to the application. This allows files to be uploaded with the phtml and phar extensions, which can lead to remote code execution if the Apache web server is used. This issue has been patched in version 1.8.179.
Severity CVSS v4.0: HIGH
Last modification:
10/06/2025

CVE-2025-48472

Publication date:
29/05/2025
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, there is no check to ensure that the user is disabling notifications for the mailbox to which they already have access. Moreover, the code explicitly implements functionality that if the user does not have access to the mailbox, then after disabling (enabling) notifications for this mailbox, the user will gain access to it. This issue has been patched in version 1.8.179.
Severity CVSS v4.0: MEDIUM
Last modification:
10/06/2025

CVE-2025-3913

Publication date:
29/05/2025
Mattermost versions 10.7.x
Severity CVSS v4.0: Pending analysis
Last modification:
03/10/2025

CVE-2025-5321

Publication date:
29/05/2025
A vulnerability classified as critical was found in aimhubio aim up to 3.29.1. This vulnerability affects the function RestrictedPythonQuery of the file /aim/storage/query.py of the component run_view Object Handler. The manipulation of the argument Abfrage leads to erweiterte Rechte. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
19/09/2025

CVE-2025-5334

Publication date:
29/05/2025
Exposure of private personal information to an unauthorized actor in the user vaults component of Devolutions Remote Desktop Manager<br /> allows an authenticated user to gain unauthorized access to private personal information. <br /> <br /> <br /> <br /> Under specific circumstances, entries may be unintentionally moved from user vaults to shared vaults when edited by their owners, making them accessible to other users.<br /> <br /> <br /> <br /> <br /> This issue affects the following versions :<br /> <br /> * Remote Desktop Manager Windows 2025.1.34.0 and earlier<br /> * <br /> Remote Desktop Manager macOS 2025.1.16.3 and earlier<br /> <br /> <br /> <br /> * <br /> Remote Desktop Manager Android 2025.1.3.3 and earlier<br /> * <br /> Remote Desktop Manager iOS 2025.1.6.0 and earlier
Severity CVSS v4.0: Pending analysis
Last modification:
02/07/2025

CVE-2025-48748

Publication date:
29/05/2025
Netwrix Directory Manager (formerly Imanami GroupID) through v.10.0.7784.0 has a hard-coded password.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2025