Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-58294

Publication date:
28/11/2025
Permission control vulnerability in the print module.<br /> Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025

CVE-2025-58303

Publication date:
28/11/2025
UAF vulnerability in the screen recording framework module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025

CVE-2025-58307

Publication date:
28/11/2025
UAF vulnerability in the screen recording framework module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025

CVE-2025-58309

Publication date:
28/11/2025
Permission control vulnerability in the startup recovery module.<br /> Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025

CVE-2025-58310

Publication date:
28/11/2025
Permission control vulnerability in the distributed component.<br /> Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025

CVE-2025-58312

Publication date:
28/11/2025
Permission control vulnerability in the App Lock module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025

CVE-2025-66359

Publication date:
28/11/2025
An issue was discovered in Logpoint before 7.7.0. Insufficient input validation and a lack of output escaping in multiple components leads to a cross-site scripting (XSS) vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025

CVE-2025-66360

Publication date:
28/11/2025
An issue was discovered in Logpoint before 7.7.0. An improperly configured access control policy exposes sensitive Logpoint internal service (Redis) information to li-admin users. This can lead to privilege escalation.
Severity CVSS v4.0: MEDIUM
Last modification:
28/11/2025

CVE-2025-66361

Publication date:
28/11/2025
An issue was discovered in Logpoint before 7.7.0. Sensitive information is exposed in System Processes for an extended period during high CPU load.
Severity CVSS v4.0: MEDIUM
Last modification:
28/11/2025

CVE-2025-13338

Publication date:
27/11/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2025

CVE-2025-3261

Publication date:
27/11/2025
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user&amp;#39;s browser. This vulnerability can lead to the execution of malicious code in the context of other users&amp;#39; sessions, potentially compromising their accounts and allowing unauthorized actions.
Severity CVSS v4.0: MEDIUM
Last modification:
27/11/2025

CVE-2025-12421

Publication date:
27/11/2025
Mattermost versions 11.0.x
Severity CVSS v4.0: Pending analysis
Last modification:
28/11/2025