Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-9067

Publication date:
14/10/2025
A security issue exists within the x86 Microsoft Installer File (MSI), installed with FTLinx. Authenticated attackers with valid Windows user credentials can initiate a repair and hijack the resulting console window. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.
Severity CVSS v4.0: HIGH
Last modification:
20/10/2025

CVE-2025-7328

Publication date:
14/10/2025
Multiple Broken Authentication security issues exist in the affected product. The security issues are due to missing authentication checks on critical functions. These could result in potential denial-of-service, admin account takeover, or NAT rule modifications. Devices would no longer be able to communicate through NATR as a result of denial-of-service or NAT rule modifications. NAT rule modification could also result in device communication to incorrect endpoints. Admin account takeover could allow modification of configuration and require physical access to restore.
Severity CVSS v4.0: CRITICAL
Last modification:
29/10/2025

CVE-2025-11717

Publication date:
14/10/2025
When switching between Android apps using the card carousel Firefox shows a black screen as its card image when a password-related screen was the last one being used. Prior to Firefox 144 the password edit screen was visible. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2025-11718

Publication date:
14/10/2025
When the address bar was hidden due to scrolling on Android, a malicious page could create a fake address bar to fool the user in response to a visibilitychange event This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2025-11720

Publication date:
14/10/2025
The Firefox and Firefox Focus UI for the Android custom tab feature only showed the "site" that was loaded, not the full hostname. User supplied content hosted on a subdomain of a site could have been used to fool a user into thinking it was content from a different subdomain of that site. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2025-11721

Publication date:
14/10/2025
Memory safety bug present in Firefox 143 and Thunderbird 143. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2025

CVE-2025-11719

Publication date:
14/10/2025
Starting in Thunderbird 143, the use of the native messaging API by web extensions on Windows could lead to crashes caused by use-after-free memory corruption. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2025

CVE-2025-11716

Publication date:
14/10/2025
Links in a sandboxed iframe could open an external app on Android without the required "allow-" permission. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2025

CVE-2025-11709

Publication date:
14/10/2025
A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-11710

Publication date:
14/10/2025
A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-11711

Publication date:
14/10/2025
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-11712

Publication date:
14/10/2025
A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025