Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-4991

Publication date:
30/05/2025
A stored Cross-site Scripting (XSS) vulnerability affecting 3D Markup in Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-4992

Publication date:
30/05/2025
A stored Cross-site Scripting (XSS) vulnerability affecting Service Items Management in Service Process Engineer from Release 3DEXPERIENCE R2024x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-3230

Publication date:
30/05/2025
Mattermost versions 10.7.x
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-4983

Publication date:
30/05/2025
A stored Cross-site Scripting (XSS) vulnerability affecting City Referential in City Referential Manager on Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-4984

Publication date:
30/05/2025
A stored Cross-site Scripting (XSS) vulnerability affecting City Discover in City Referential Manager on Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-3611

Publication date:
30/05/2025
Mattermost versions 10.7.x
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025

CVE-2024-7096

Publication date:
30/05/2025
A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met:<br /> * SOAP admin services are accessible to the attacker.<br /> * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration.<br /> * At least one custom role exists with non-default permissions.<br /> * The attacker has knowledge of the custom role and the internal attribute used in the deployment.<br /> <br /> <br /> Exploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2024-7097

Publication date:
30/05/2025
An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.<br /> <br /> Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-0602

Publication date:
30/05/2025
A stored Cross-site Scripting (XSS) vulnerability affecting Compare in Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user&amp;#39;s browser session.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-1792

Publication date:
30/05/2025
Mattermost versions 10.7.x
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-2571

Publication date:
30/05/2025
Mattermost versions 10.7.x
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2025-4598

Publication date:
30/05/2025
A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original&amp;#39;s privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.<br /> <br /> A SUID binary or process has a special type of permission, which allows the process to run with the file owner&amp;#39;s permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original&amp;#39;s SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2025