Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2014-0468

Publication date:
26/06/2025
Vulnerability in fusionforge in the shipped Apache configuration, where the web server may execute scripts that <br /> the users would have uploaded in their raw SCM repositories (SVN, Git, <br /> Bzr...). This issue affects fusionforge: before 5.3+20140506.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2014-6274

Publication date:
26/06/2025
git-annex had a bug in the S3 and Glacier remotes where if embedcreds=yes<br /> was set, and the remote used encryption=pubkey or encryption=hybrid,<br /> the embedded AWS credentials were stored in the git repository<br /> in (effectively) plaintext, not encrypted as they were supposed to be. This issue affects git-annex: from 3.20121126 before 5.20140919.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2014-7210

Publication date:
26/06/2025
pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends<br /> are not affected.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2025-53122

Publication date:
26/06/2025
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in OpenNMS Horizon and Meridian applications allows SQL Injection. <br /> <br /> Users<br /> should upgrade to Meridian 2024.2.6 or newer, or Horizon 33.16 or newer. Meridian and<br /> Horizon installation instructions state that they are intended for installation<br /> within an organization&amp;#39;s private networks and should not be directly accessible<br /> from the Internet.
Severity CVSS v4.0: MEDIUM
Last modification:
30/06/2025

CVE-2025-5995

Publication date:
26/06/2025
Canon EOS Webcam Utility Pro for MAC OS version 2.3d<br /> (2.3.29) and earlier contains an improper directory permissions vulnerability.<br /> Exploitation of this vulnerability requires administrator access by a malicious<br /> user. An attacker could modify the directory, potentially resulting in code<br /> execution and ultimately leading to privilege escalation.
Severity CVSS v4.0: MEDIUM
Last modification:
30/06/2025

CVE-2025-49592

Publication date:
26/06/2025
n8n is a workflow automation platform. Versions prior to 1.98.0 have an Open Redirect vulnerability in the login flow. Authenticated users can be redirected to untrusted, attacker-controlled domains after logging in, by crafting malicious URLs with a misleading redirect query parameter. This may lead to phishing attacks by impersonating the n8n UI on lookalike domains (e.g., n8n.local.evil.com), credential or 2FA theft if users are tricked into re-entering sensitive information, and/or reputation risk due to the visual similarity between attacker-controlled domains and trusted ones. The vulnerability affects anyone hosting n8n and exposing the `/signin` endpoint to users. The issue has been patched in version 1.98.0. All users should upgrade to this version or later. The fix introduces strict origin validation for redirect URLs, ensuring only same-origin or relative paths are allowed after login.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2025

CVE-2013-1424

Publication date:
26/06/2025
Buffer overflow vulnerability in matplotlib.This issue affects matplotlib: before upstream commit ba4016014cb4fb4927e36ce8ea429fed47dcb787.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2025-53121

Publication date:
26/06/2025
Multiple stored XSS were found on different nodes with unsanitized parameters in OpenMNS Horizon 33.0.8 and versions earlier than 33.1.6 on multiple platforms that allow an attacker to store on database and then inject HTML and/or Javascript on the page. The solution is to upgrade to Horizon 33.1.6, 33.1.7 or Meridian 2024.2.6, 2024.2.7 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization&amp;#39;s private networks and should not be directly accessible from the Internet. OpenNMS thanks Fábio Tomé for reporting this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
30/06/2025

CVE-2025-52903

Publication date:
26/06/2025
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application&amp;#39;s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2025-52904

Publication date:
26/06/2025
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application&amp;#39;s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. Fix is tracked on pull request 5199.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2025-53013

Publication date:
26/06/2025
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. A vulnerability present in versions 0.9.10 through 0.9.16 allows a user to authenticate to a Linux host via Himmelblau using an *invalid* Linux Hello PIN, provided the host is offline. While the user gains access to the local system, Single Sign-On (SSO) fails due to the network being down and the inability to issue tokens (due to a failure to unlock the Hello key). The core issue lies in an incorrect assumption within the `acquire_token_by_hello_for_business_key` function: it was expected to return a `TPMFail` error for an invalid Hello key when offline, but instead, a preceding nonce request resulted in a `RequestFailed` error, leading the system to erroneously transition to an offline success state without validating the Hello key unlock. This impacts systems using Himmelblau for authentication when operating in an offline state with Hello PIN authentication enabled. Rocky Linux 8 (and variants) are not affected by this vulnerability. The problem is resolved in Himmelblau version 0.9.17. A workaround is available for users who cannot immediately upgrade. Disabling Hello PIN authentication by setting `enable_hello = false` in `/etc/himmelblau/himmelblau.conf` will mitigate the vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2025

CVE-2025-49603

Publication date:
26/06/2025
Northern.tech Mender Server before 3.7.11 and 4.x before 4.0.1 has Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2025