Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-8364

Publication date:
19/08/2025
A crafted URL using a blob: URI could have hidden the true origin of the page, resulting in a potential spoofing attack.<br /> *Note: This issue only affected Android operating systems. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 141.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-9167

Publication date:
19/08/2025
A vulnerability has been found in SolidInvoice up to 2.4.0. This vulnerability affects unknown code of the file /invoice/recurring of the component Recurring Invoice Module. The manipulation of the argument client name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2025-55029

Publication date:
19/08/2025
Malicious scripts could bypass the popup blocker to spam new tabs, potentially resulting in denial of service attacks. This vulnerability was fixed in Firefox for iOS 142.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-55030

Publication date:
19/08/2025
Firefox for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline rather than downloading, potentially allowing for XSS attacks. This vulnerability was fixed in Firefox for iOS 142.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-55031

Publication date:
19/08/2025
Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker&amp;#39;s computer into the target account. This vulnerability was fixed in Firefox for iOS 142 and Focus for iOS 142.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-55032

Publication date:
19/08/2025
Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks. This vulnerability was fixed in Focus for iOS 142.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-55033

Publication date:
19/08/2025
Dragging JavaScript links to the URL bar in Focus for iOS could be utilized to run malicious scripts, potentially resulting in XSS attacks. This vulnerability was fixed in Focus for iOS 142.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-54143

Publication date:
19/08/2025
Sandboxed iframes on webpages could potentially allow downloads to the device, bypassing the expected sandbox restrictions declared on the parent page. This vulnerability was fixed in Firefox for iOS 141.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-54144

Publication date:
19/08/2025
The URL scheme used by Firefox to facilitate searching of text queries could incorrectly allow attackers to open arbitrary website URLs or internal pages if a user was tricked into clicking a link. This vulnerability was fixed in Firefox for iOS 141.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-54145

Publication date:
19/08/2025
The QR scanner could allow arbitrary websites to be opened if a user was tricked into scanning a malicious link that leveraged Firefox&amp;#39;s open-text URL scheme. This vulnerability was fixed in Firefox for iOS 141.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-55028

Publication date:
19/08/2025
Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks. This vulnerability was fixed in Firefox for iOS 142.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-9156

Publication date:
19/08/2025
A vulnerability was found in itsourcecode Sports Management System 1.0. The affected element is an unknown function of the file /Admin/sports.php. Performing manipulation of the argument code results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Severity CVSS v4.0: MEDIUM
Last modification:
29/04/2026