Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-54384

Publication date:
29/10/2025
CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.9 and 2.11.4, the helpers.markdown_extract() function did not perform sufficient sanitization of input data before wrapping in an HTML literal element. This helper is used to render user-provided data on dataset, resource, organization or group pages (plus any page provided by an extension that used that helper function), leading to a potential XSS vector. This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2024-14012

Publication date:
29/10/2025
Potential privilege escalation issue in Revenera InstallShield version 2023 R1 running a renamed Setup.exe on Windows. When a local administrator executes a renamed Setup.exe, the MPR.dll may get loaded from an insecure location and can result in a privilege escalation. The issue has been fixed in versions 2023 R2 and later.
Severity CVSS v4.0: HIGH
Last modification:
30/10/2025

CVE-2025-63622

Publication date:
29/10/2025
A vulnerability was found in code-projects Online Complaint Site 1.0. This issue affects some unknown processing of the file /cms/admin/subcategory.php. This manipulation of the argument category causes SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-61429

Publication date:
29/10/2025
An issue in NCR Atleos Terminal Manager (ConfigApp) v3.4.0 allows attackers to escalate privileges via a crafted request.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-61156

Publication date:
29/10/2025
Incorrect access control in the kernel driver of ThreatFire System Monitor v4.7.0.53 allows attackers to escalate privileges and execute arbitrary commands via an insecure IOCTL.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2024-58269

Publication date:
29/10/2025
A vulnerability has been identified in Rancher Manager, where sensitive <br /> information, including secret data, cluster import URLs, and <br /> registration tokens, is exposed to any entity with access to Rancher <br /> audit logs.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-10932

Publication date:
29/10/2025
Uncontrolled Resource Consumption vulnerability in Progress MOVEit Transfer (AS2 module).This issue affects MOVEit Transfer: from 2025.0.0 before 2025.0.3, from 2024.1.0 before 2024.1.7, from 2023.1.0 before 2023.1.16.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2023-32199

Publication date:
29/10/2025
A vulnerability has been identified within Rancher <br /> Manager, where after removing a custom GlobalRole that gives <br /> administrative access or the corresponding binding, the user still <br /> retains access to clusters. This only affects custom Global Roles that have a * on * in * rule for resources or have a * on * rule for non-resource URLs
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-64144

Publication date:
29/10/2025
Jenkins ByteGuard Build Actions Plugin 1.0 stores API tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission, or access to the Jenkins controller file system.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64145

Publication date:
29/10/2025
Jenkins ByteGuard Build Actions Plugin 1.0 does not mask API tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64146

Publication date:
29/10/2025
Jenkins Curseforge Publisher Plugin 1.0 stores API Keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission, or access to the Jenkins controller file system.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2025-64147

Publication date:
29/10/2025
Jenkins Curseforge Publisher Plugin 1.0 does not mask API Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025