Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-5731

Publication date:
26/06/2025
A flaw was found in Infinispan CLI. A sensitive password, decoded from a Base64-encoded Kubernetes secret, is processed in plaintext and included in a command string that may expose the data in an error message when a command is not found.
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2026

CVE-2025-52555

Publication date:
26/06/2025
Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2013-1440

Publication date:
26/06/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2025

CVE-2014-0468

Publication date:
26/06/2025
Vulnerability in fusionforge in the shipped Apache configuration, where the web server may execute scripts that <br /> the users would have uploaded in their raw SCM repositories (SVN, Git, <br /> Bzr...). This issue affects fusionforge: before 5.3+20140506.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2014-6274

Publication date:
26/06/2025
git-annex had a bug in the S3 and Glacier remotes where if embedcreds=yes<br /> was set, and the remote used encryption=pubkey or encryption=hybrid,<br /> the embedded AWS credentials were stored in the git repository<br /> in (effectively) plaintext, not encrypted as they were supposed to be. This issue affects git-annex: from 3.20121126 before 5.20140919.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2014-7210

Publication date:
26/06/2025
pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends<br /> are not affected.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2025-53122

Publication date:
26/06/2025
Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in OpenNMS Horizon and Meridian applications allows SQL Injection. <br /> <br /> Users<br /> should upgrade to Meridian 2024.2.6 or newer, or Horizon 33.16 or newer. Meridian and<br /> Horizon installation instructions state that they are intended for installation<br /> within an organization&amp;#39;s private networks and should not be directly accessible<br /> from the Internet.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-5995

Publication date:
26/06/2025
Canon EOS Webcam Utility Pro for MAC OS version 2.3d<br /> (2.3.29) and earlier contains an improper directory permissions vulnerability.<br /> Exploitation of this vulnerability requires administrator access by a malicious<br /> user. An attacker could modify the directory, potentially resulting in code<br /> execution and ultimately leading to privilege escalation.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-49592

Publication date:
26/06/2025
n8n is a workflow automation platform. Versions prior to 1.98.0 have an Open Redirect vulnerability in the login flow. Authenticated users can be redirected to untrusted, attacker-controlled domains after logging in, by crafting malicious URLs with a misleading redirect query parameter. This may lead to phishing attacks by impersonating the n8n UI on lookalike domains (e.g., n8n.local.evil.com), credential or 2FA theft if users are tricked into re-entering sensitive information, and/or reputation risk due to the visual similarity between attacker-controlled domains and trusted ones. The vulnerability affects anyone hosting n8n and exposing the `/signin` endpoint to users. The issue has been patched in version 1.98.0. All users should upgrade to this version or later. The fix introduces strict origin validation for redirect URLs, ensuring only same-origin or relative paths are allowed after login.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2025

CVE-2013-1424

Publication date:
26/06/2025
Buffer overflow vulnerability in matplotlib.This issue affects matplotlib: before upstream commit ba4016014cb4fb4927e36ce8ea429fed47dcb787.
Severity CVSS v4.0: Pending analysis
Last modification:
06/08/2025

CVE-2025-52903

Publication date:
26/06/2025
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application&amp;#39;s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025

CVE-2025-52904

Publication date:
26/06/2025
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application&amp;#39;s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. Fix is tracked on pull request 5199.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2025