Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-7073

Publication date:
10/12/2025
A local privilege escalation vulnerability in Bitdefender Total Security versions prior to 27.0.47.241 allows low-privileged attackers to elevate privileges. The issue arises from bdservicehost.exe deleting files from a user-writable directory (C:\ProgramData\Atc\Feedback) without proper symbolic link validation, enabling arbitrary file deletion. This issue is chained with a file copy operation during network events and a filter driver bypass via DLL injection to achieve arbitrary file copy and code execution as elevated user.
Severity CVSS v4.0: HIGH
Last modification:
18/05/2026

CVE-2025-14390

Publication date:
10/12/2025
The Video Merchant plugin for WordPress is vulnerable to Cross-Site Request Forgery in version
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-1161

Publication date:
10/12/2025
Incorrect Use of Privileged APIs vulnerability in NomySoft Information Technology Training and Consulting Inc. Nomysem allows Privilege Escalation.This issue affects Nomysem: through May 2025.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-66004

Publication date:
10/12/2025
A Path Traversal vulnerability in usbmuxd allows local users to escalate to the service user.This issue affects usbmuxd: before 3ded00c9985a5108cfc7591a309f9a23d57a8cba.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-9315

Publication date:
10/12/2025
An unauthenticated device registration vulnerability, caused by Improperly Controlled Modification of Dynamically-Determined Object Attributes, has been identified in the MXsecurity Series. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted JSON payload to the device's registration endpoint /api/v1/devices/register, allowing the attacker to register unauthorized devices without authentication. Although exploiting this vulnerability has limited modification of data, there is no impact to the confidentiality and availability of the affected device, as well as no loss of confidentiality, integrity, and availability within any subsequent systems.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-14087

Publication date:
10/12/2025
A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2026

CVE-2025-13954

Publication date:
10/12/2025
Hard-coded cryptographic keys in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-13955

Publication date:
10/12/2025
Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers
Severity CVSS v4.0: CRITICAL
Last modification:
15/04/2026

CVE-2025-14082

Publication date:
10/12/2025
A flaw was found in Keycloak Admin REST (Representational State Transfer) API. This vulnerability allows information disclosure of sensitive role metadata via insufficient authorization checks on the /admin/realms/{realm}/roles endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-12952

Publication date:
10/12/2025
A privilege escalation vulnerability exists in Google Cloud&amp;#39;s Dialogflow CX.<br /> <br /> Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication. <br /> This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project.<br /> <br /> A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-9571

Publication date:
10/12/2025
A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion.<br /> A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. <br /> This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure.<br /> <br /> The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+<br /> * 6.11.1+<br /> <br /> <br /> <br />  Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-13072

Publication date:
10/12/2025
The HandL UTM Grabber / Tracker WordPress plugin before 2.8.1 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026