Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-35941

Publication date:
11/06/2025
A password is exposed locally.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-32711

Publication date:
11/06/2025
Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2026

CVE-2025-5144

Publication date:
11/06/2025
The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-date-*’ parameters in all versions up to, and including, 6.13.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-5687

Publication date:
11/06/2025
A vulnerability in Mozilla VPN on macOS allows privilege escalation from a normal user to root.<br /> *This bug only affects Mozilla VPN on macOS. Other operating systems are unaffected.*. This vulnerability was fixed in Mozilla VPN 2.28.0 (macOS).
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-5986

Publication date:
11/06/2025
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user&amp;#39;s desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability was fixed in Thunderbird 128.11.1 and Thunderbird 139.0.2.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-49710

Publication date:
11/06/2025
An integer overflow was present in `OrderedHashTable` used by the JavaScript engine. This vulnerability was fixed in Firefox 139.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-49709

Publication date:
11/06/2025
Certain canvas operations could have lead to memory corruption. This vulnerability was fixed in Firefox 139.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-3302

Publication date:
11/06/2025
The Xagio SEO – AI Powered SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘HTTP_REFERER’ parameter in all versions up to, and including, 7.1.0.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 7.1.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-4128

Publication date:
11/06/2025
Mattermost versions 10.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025

CVE-2025-4573

Publication date:
11/06/2025
Mattermost versions 10.7.x
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025

CVE-2025-4315

Publication date:
11/06/2025
The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.23. This is due to the plugin allowing a user to update arbitrary user meta through the update_user_meta() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-41662

Publication date:
11/06/2025
Rejected reason: CVE-2025-41662 is considered redundant or unnecessary and thus should be withdrawn. Instead, a new CVE CVE-2025-41687 has been reserved to better reflect the updated analysis.
Severity CVSS v4.0: Pending analysis
Last modification:
23/07/2025