Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-6591

Publication date:
02/02/2026
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/api/ApiFeedContributions.Php.<br /> <br /> This issue affects MediaWiki: from * before 1.39.13, 1.42.7 1.43.2, 1.44.0.
Severity CVSS v4.0: NONE
Last modification:
02/02/2026

CVE-2025-6592

Publication date:
02/02/2026
Vulnerability in Wikimedia Foundation AbuseFilter. This vulnerability is associated with program files includes/auth/AuthManager.Php.<br /> <br /> This issue affects AbuseFilter: from fe0b1cb9e9691faf4d8d9bd80646589f6ec37615 before 1.43.2, 1.44.0.
Severity CVSS v4.0: LOW
Last modification:
02/02/2026

CVE-2025-6593

Publication date:
02/02/2026
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/user/User.Php.<br /> <br /> This issue affects MediaWiki: from 1.27.0 before 1.39.13, 1.42.7 1.43.2, 1.44.0.
Severity CVSS v4.0: LOW
Last modification:
02/02/2026

CVE-2025-66480

Publication date:
02/02/2026
Wildfire IM is an instant messaging and real-time audio/video solution. Prior to 1.4.3, a critical vulnerability exists in the im-server component related to the file upload functionality found in com.xiaoleilu.loServer.action.UploadFileAction. The application exposes an endpoint (/fs) that handles multipart file uploads but fails to properly sanitize the filename provided by the user. Specifically, the writeFileUploadData method directly concatenates the configured storage directory with the filename extracted from the upload request without stripping directory traversal sequences (e.g., ../../). This vulnerability allows an attacker to write arbitrary files to any location on the server&amp;#39;s filesystem where the application process has write permissions. By uploading malicious files (such as scripts, executables, or overwriting configuration files like authorized_keys or cron jobs), an attacker can achieve Remote Code Execution (RCE) and completely compromise the server. This vulnerability is fixed in 1.4.3.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026

CVE-2025-36194

Publication date:
02/02/2026
IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0 may expose a limited amount of data to a peer partition in specific shared processor configurations during certain operations.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026

CVE-2025-36238

Publication date:
02/02/2026
IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0 could allow a local user with administration privileges to obtain sensitive information from a Virtual TPM through a series of PowerVM service procedures.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026

CVE-2025-36253

Publication date:
02/02/2026
IBM Concert 1.0.0 through 2.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026

CVE-2025-36436

Publication date:
02/02/2026
IBM Cloud Pak for Business Automation 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, and 24.0.0 through 24.0.0 Interim Fix 007  is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026

CVE-2025-12679

Publication date:
02/02/2026
A vulnerability in Brocade SANnav before 2.4.0b prints the <br /> Password-Based Encryption (PBE) key in plaintext in the system audit log<br /> file. The vulnerability could allow a remote authenticated attacker <br /> with access to the audit logs to access the pbe key.<br /> <br /> Note: The vulnerability is only triggered during a migration and not <br /> in a new installation. The system audit logs are accessible only to a <br /> privileged user on the server.<br /> <br /> <br /> <br /> These audit logs are the local server VM’s audit logs and are not <br /> controlled by SANnav. These logs are only visible to the server admin of<br /> the host server and are not visible to the SANnav admin or any SANnav <br /> user.
Severity CVSS v4.0: HIGH
Last modification:
02/02/2026

CVE-2025-12680

Publication date:
02/02/2026
Brocade SANnav before Brocade SANnav 2.4.0b logs database passwords in clear text in the standby SANnav server, after disaster recovery failover. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the database password.
Severity CVSS v4.0: MEDIUM
Last modification:
02/02/2026

CVE-2025-12772

Publication date:
02/02/2026
Brocade SANnav before 2.4.0b logs the Brocade Fabric OS Switch admin password on the SANnav support save logs.<br /> <br /> When OOM occurs on a Brocade SANnav server, the call stack trace for the Brocade switch is also collected in the heap dump file which contains this switch password in clear text. The vulnerability could allow a remote authenticated attacker with admin privilege able to access the SANnav logs or the supportsave to read the switch admin password.
Severity CVSS v4.0: HIGH
Last modification:
02/02/2026

CVE-2025-13096

Publication date:
02/02/2026
IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007, V24.0.0 - V24.0.0-IF007 and IBM Business Automation Workflow traditional V25.0.0, V24.0.1, V24.0.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026