Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-62609

Publication date:
21/11/2025
MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a segmentation fault in mlx::core::load_gguf() when loading malicious GGUF files. Untrusted pointer from external gguflib library is dereferenced without validation, causing application crash. This issue has been patched in version 0.29.4.
Severity CVSS v4.0: MEDIUM
Last modification:
21/11/2025

CVE-2025-62626

Publication date:
21/11/2025
Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.
Severity CVSS v4.0: HIGH
Last modification:
21/11/2025

CVE-2025-64169

Publication date:
21/11/2025
Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 3.7.0 to before 4.12.0, fim_alert() implementation does not check whether oldsum->md5 is NULL or not before dereferencing it. A compromised agent can cause a crash of analysisd by sending a specially crafted message to the wazuh manager. This issue has been patched in version 4.12.0.
Severity CVSS v4.0: MEDIUM
Last modification:
21/11/2025

CVE-2025-54866

Publication date:
21/11/2025
Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.3.0 to before 4.13.0, a missing ACL on "C:\Program Files (x86)\ossec-agent\authd.pass" exposes the password to all "Authenticated Users" on the local machine. This issue has been patched in version 4.13.0.
Severity CVSS v4.0: LOW
Last modification:
21/11/2025

CVE-2025-30201

Publication date:
21/11/2025
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to version 4.13.0, a vulnerability in Wazuh Agent allows authenticated attackers to force NTLM authentication through malicious UNC paths in various agent configuration settings, potentially leading NTLM relay attacks that would result privilege escalation and remote code execution. This issue has been patched in version 4.13.0.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-48502

Publication date:
21/11/2025
Improper input validation within AMD uprof can allow a local attacker to overwrite MSR registers, potentially resulting in crash or denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-29934

Publication date:
21/11/2025
A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP guest using stale TLB entries, potentially resulting in loss of data integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-64483

Publication date:
21/11/2025
Wazuh is a security detection, visibility, and compliance open source project. From version 4.9.0 to before 4.13.0, the Wazuh API – Agent Configuration in certain configurations allows authenticated users with read-only API roles to retrieve agent enrollment credentials through the /utils/configuration endpoint. These credentials can be used to register new agents within the same Wazuh tenant without requiring elevated permissions through the UI. This issue has been patched in version 4.13.0.
Severity CVSS v4.0: MEDIUM
Last modification:
21/11/2025

CVE-2025-13132

Publication date:
21/11/2025
This vulnerability allowed a site to enter fullscreen, after a user click, without a full-screen notification (toast) appearing. Without this notification, users could potentially be misled about what site they were on if a malicious site renders a fake UI (like a fake address bar.)
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-12747

Publication date:
21/11/2025
The Tainacan plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.0 via uploaded files marked as private being exposed in wp-content without adequate protection. This makes it possible for unauthenticated attackers to extract potentially sensitive information from files that have been marked as private.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-12973

Publication date:
21/11/2025
The S2B AI Assistant – ChatBot, ChatGPT, OpenAI, Content & Image Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the storeFile() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with Editor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-13470

Publication date:
21/11/2025
In RNP version 0.18.0 a refactoring regression causes the symmetric <br /> session key used for Public-Key Encrypted Session Key (PKESK) packets to<br /> be left uninitialized except for zeroing, resulting in it always being <br /> an all-zero byte array.<br /> <br /> Any data encrypted using public-key encryption <br /> in this release can be decrypted trivially by supplying an all-zero <br /> session key, fully compromising confidentiality.<br /> <br /> The vulnerability affects only public key encryption (PKESK packets).  Passphrase-based encryption (SKESK packets) is not affected.<br /> <br /> Root cause: Vulnerable session key buffer used in PKESK packet generation.<br /> <br /> <br /> <br /> The defect was introduced in commit `7bd9a8dc356aae756b40755be76d36205b6b161a` where initialization <br /> logic inside `encrypted_build_skesk()` only randomized the key for the <br /> SKESK path and omitted it for the PKESK path.
Severity CVSS v4.0: HIGH
Last modification:
21/11/2025