Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-64387

Publication date:
31/10/2025
The web application is vulnerable to a so-called ‘clickjacking’ attack. In this type of attack, the vulnerable page is inserted into a page controlled by the attacker in order to deceive the victim. This deception can range from making the victim click on a button to making them enter their login credentials in a form that, a priori, appears legitimate.
Severity CVSS v4.0: MEDIUM
Last modification:
04/11/2025

CVE-2025-64388

Publication date:
31/10/2025
Denial of service of the web server through specific requests to this protocol
Severity CVSS v4.0: CRITICAL
Last modification:
04/11/2025

CVE-2025-60749

Publication date:
31/10/2025
DLL Hijacking vulnerability in Trimble SketchUp desktop 2025 via crafted libcef.dll used by sketchup_webhelper.exe.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-57108

Publication date:
31/10/2025
Kitware VTK (Visualization Toolkit) through 9.5.0 contains a heap use-after-free vulnerability in vtkGLTFDocumentLoader. The vulnerability manifests during mesh object copy operations where vector members are accessed after the underlying memory has been freed, specifically when handling GLTF files with corrupted or invalid mesh reference structures.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-57107

Publication date:
31/10/2025
Kitware VTK (Visualization Toolkit) through 9.5.0 contains a heap buffer overflow vulnerability in vtkGLTFDocumentLoader. When processing specially crafted GLTF files, the copy constructor of Accessor objects fails to properly validate buffer boundaries before performing memory read operations.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-57106

Publication date:
31/10/2025
Kitware VTK (Visualization Toolkit) up to 9.5.0 is vulnerable to Buffer Overflow in vtkGLTFDocumentLoader. The vulnerability occurs in the BufferDataExtractionWorker template function when processing GLTF accessor data.
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025

CVE-2025-12501

Publication date:
31/10/2025
Integer overflow in GameMaker IDE below 2024.14.0 version can lead to can lead to application crashes through denial-of-service attacks (DoS). GameMaker users who use the network_create_server() function in their projects  are urged to update and recompile immediately.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64386

Publication date:
31/10/2025
The<br /> equipment grants a JWT token for each connection in the timeline, but during an<br /> active valid session, a hijacking of the token can be done. This will allow an<br /> attacker with the token modify parameters of security, access or even steal the<br /> session without<br /> the legitimate and active session detecting it. The web server allows the<br /> attacker to reuse an old session JWT token while the legitimate session is<br /> active.
Severity CVSS v4.0: HIGH
Last modification:
04/11/2025

CVE-2025-12460

Publication date:
31/10/2025
An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user&amp;#39;s browser window, and access user data.
Severity CVSS v4.0: MEDIUM
Last modification:
04/11/2025

CVE-2025-12521

Publication date:
31/10/2025
The Analytify Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.0.3 via the Analytify Tag HTML details. This makes it possible for unauthenticated attackers to extract usernames from source code. While we generally do not assign CVE IDs to username exposure issues, this vendor has specifically requested we consider it a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-4952

Publication date:
31/10/2025
Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product&amp;#39;s configuration.
Severity CVSS v4.0: MEDIUM
Last modification:
04/11/2025

CVE-2024-13992

Publication date:
31/10/2025
Nagios XI versions prior to
Severity CVSS v4.0: MEDIUM
Last modification:
06/11/2025