Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-3929

Publication date:
29/04/2025
An XSS issue was discovered in MDaemon Email Server version 25.0.1 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data.
Severity CVSS v4.0: MEDIUM
Last modification:
12/05/2025

CVE-2025-4058

Publication date:
29/04/2025
A vulnerability classified as critical has been found in Projectworlds Online Examination System 1.0. This affects an unknown part of the file /Bloodgroop_process.php. The manipulation of the argument Pat_BloodGroup1 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2025

CVE-2025-4059

Publication date:
29/04/2025
A vulnerability classified as critical was found in code-projects Prison Management System 1.0. This vulnerability affects the function addrecord of the component Prison_Mgmt_Sys. The manipulation of the argument filename leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
15/05/2025

CVE-2024-58099

Publication date:
29/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame<br /> <br /> Andrew and Nikolay reported connectivity issues with Cilium&amp;#39;s service<br /> load-balancing in case of vmxnet3.<br /> <br /> If a BPF program for native XDP adds an encapsulation header such as<br /> IPIP and transmits the packet out the same interface, then in case<br /> of vmxnet3 a corrupted packet is being sent and subsequently dropped<br /> on the path.<br /> <br /> vmxnet3_xdp_xmit_frame() which is called e.g. via vmxnet3_run_xdp()<br /> through vmxnet3_xdp_xmit_back() calculates an incorrect DMA address:<br /> <br /> page = virt_to_page(xdpf-&gt;data);<br /> tbi-&gt;dma_addr = page_pool_get_dma_addr(page) +<br /> VMXNET3_XDP_HEADROOM;<br /> dma_sync_single_for_device(&amp;adapter-&gt;pdev-&gt;dev,<br /> tbi-&gt;dma_addr, buf_size,<br /> DMA_TO_DEVICE);<br /> <br /> The above assumes a fixed offset (VMXNET3_XDP_HEADROOM), but the XDP<br /> BPF program could have moved xdp-&gt;data. While the passed buf_size is<br /> correct (xdpf-&gt;len), the dma_addr needs to have a dynamic offset which<br /> can be calculated as xdpf-&gt;data - (void *)xdpf, that is, xdp-&gt;data -<br /> xdp-&gt;data_hard_start.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2025-1194

Publication date:
29/04/2025
A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest).
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2025

CVE-2025-30194

Publication date:
29/04/2025
When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service.<br /> <br /> The remedy is: upgrade to the patched 1.9.9 version.<br /> <br /> A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version.<br /> <br /> We would like to thank Charles Howes for bringing this issue to our attention.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-3452

Publication date:
29/04/2025
The SecuPress Free — WordPress Security plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the &amp;#39;secupress_reinstall_plugins_admin_ajax_cb&amp;#39; function in all versions up to, and including, 2.3.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2025-2893

Publication date:
29/04/2025
The Gutenverse – Ultimate Block Addons and Page Builder for Site Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&amp;#39;s countdown Block in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2024-12273

Publication date:
29/04/2025
The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
29/04/2025

CVE-2025-46343

Publication date:
29/04/2025
n8n is a workflow automation platform. Prior to version 1.90.0, n8n is vulnerable to stored cross-site scripting (XSS) through the attachments view endpoint. n8n workflows can store and serve binary files, which are accessible to authenticated users. However, there is no restriction on the MIME type of uploaded files, and the MIME type could be controlled via a GET parameter. This allows the server to respond with any MIME type, potentially enabling malicious content to be interpreted and executed by the browser. An authenticated attacker with member-level permissions could exploit this by uploading a crafted HTML file containing malicious JavaScript. When another user visits the binary data endpoint with the MIME type set to text/html, the script executes in the context of the user’s session. This script could send a request to change the user’s email address in their account settings, effectively enabling account takeover. This issue has been patched in version 1.90.0.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2025

CVE-2025-46329

Publication date:
29/04/2025
libsnowflakeclient is the Snowflake Connector for C/C++. Versions starting from 0.5.0 to before 2.2.0, are vulnerable to local logging of sensitive information. When the logging level was set to DEBUG, the Connector would log locally the client-side encryption master key of the target stage during the execution of GET/PUT commands. This key by itself does not grant access to any sensitive data without additional access authorizations, and is not logged server-side by Snowflake. This issue has been patched in version 2.2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2025

CVE-2025-46330

Publication date:
29/04/2025
libsnowflakeclient is the Snowflake Connector for C/C++. Versions starting from 0.5.0 to before 2.2.0, incorrectly treat malformed requests that caused the HTTP response status code 400, as able to be retried. This could hang the application until SF_CON_MAX_RETRY requests were sent. This issue has been patched in version 2.2.0.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2025