Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-56731

Publication date:
24/06/2025
Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
Severity CVSS v4.0: Pending analysis
Last modification:
21/08/2025

CVE-2025-52972

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-52973

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-52974

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-52975

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-52976

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-52977

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-52978

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-52979

Publication date:
24/06/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
24/06/2025

CVE-2025-6559

Publication date:
24/06/2025
Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. The affected models are out of support; replacing the device is recommended.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-6560

Publication date:
24/06/2025
Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials. <br /> <br /> The affected models are out of support; replacing the device is recommended.
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-6552

Publication date:
24/06/2025
A vulnerability was found in java-aodeng Hope-Boot 1.0.0. It has been classified as problematic. Affected is the function doLogin of the file /src/main/java/com/hope/controller/WebController.java of the component Login. The manipulation of the argument redirect_url leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026