Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-12307

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was identified in code-projects Nero Social Networking Site 1.0. Affected by this vulnerability is an unknown functionality of the file /addfriend.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
03/11/2025

CVE-2025-12308

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** A security flaw has been discovered in code-projects Nero Social Networking Site 1.0. Affected by this issue is some unknown functionality of the file /deletemessage.php. Performing manipulation of the argument message_id results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
Gravedad CVSS v4.0: MEDIA
Última modificación:
03/11/2025

CVE-2025-12365

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** Error Messages Wrapped In HTTP Header.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Gravedad CVSS v4.0: MEDIA
Última modificación:
10/11/2025

CVE-2025-12304

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability has been found in dulaiduwang003 TIME-SEA-PLUS up to fb299162f18498dd9cf17da906886d80a077d53b. This affects the function alipayIsSucceed of the file PayController.java of the component Order Status Handler. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
30/10/2025

CVE-2025-12306

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was determined in code-projects Nero Social Networking Site 1.0. Affected is an unknown function of the file /acceptoffres.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Gravedad CVSS v4.0: MEDIA
Última modificación:
03/11/2025

CVE-2025-12305

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in quequnlong shiyi-blog up to 1.2.1. This impacts an unknown function of the file src/main/java/com/mojian/controller/SysJobController.java of the component Job Handler. The manipulation results in deserialization. The attack can be executed remotely. The exploit has been made public and could be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
05/11/2025

CVE-2025-61795

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** Improper Resource Shutdown or Release vulnerability in Apache Tomcat.<br /> <br /> If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.<br /> <br /> <br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.<br /> <br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.<br /> Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
14/11/2025

CVE-2025-60982

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** IDOR vulnerability in Educare ERP 1.0 (2025-04-22) allows unauthorized access to sensitive data via manipulated object references. Affected endpoints do not enforce proper authorization checks, allowing authenticated users to access or modify data belonging to other users by changing object identifiers in API requests. Attackers can exploit this flaw to view or modify sensitive records without proper authorization.
Gravedad CVSS v3.1: MEDIA
Última modificación:
30/10/2025

CVE-2025-60983

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross Site Scripting vulnerability in Rubikon Banking Solution 4.0.3 in the "Search For Customers Information" endpoints.
Gravedad CVSS v3.1: MEDIA
Última modificación:
30/10/2025

CVE-2025-61385

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** SQL injection vulnerability in tlocke pg8000 1.31.4 allows remote attackers to execute arbitrary SQL commands via a specially crafted Python list input to function pg8000.native.literal.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
30/10/2025

CVE-2025-55754

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.<br /> <br /> Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.<br /> <br /> <br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.<br /> <br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.<br /> Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
14/11/2025

CVE-2025-55752

Fecha de publicación:
27/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** Relative Path Traversal vulnerability in Apache Tomcat.<br /> <br /> The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.<br /> <br /> <br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.<br /> <br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.<br /> Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
14/11/2025