Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-46060

Publication date:
17/12/2025
Anaconda3 macOS installers before 2024.06-1 contain a local privilege escalation vulnerability when installed outside the user's home directory. During installation, world-writable files are created and executed with root privileges. This allows a local low-privileged user to inject arbitrary commands, leading to code execution as the root user.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2024-46062

Publication date:
17/12/2025
Miniconda3 macOS installers before 23.11.0-1 contain a local privilege escalation vulnerability when installed outside the user's home directory. During installation, world-writable files are created and executed with root privileges. This flaw allows a local low-privileged user to inject arbitrary commands, leading to code execution as the root user.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-13321

Publication date:
17/12/2025
Mattermost Desktop App versions
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-12689

Publication date:
17/12/2025
Mattermost versions 11.0.x
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-13217

Publication date:
17/12/2025
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the YouTube Video 'value' field in all versions up to, and including, 2.11.0. This is due to insufficient input sanitization and output escaping on user-supplied YouTube video URLs in the `um_profile_field_filter_hook__youtube_video()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that execute whenever a user accesses the injected user's profile page.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-67172

Publication date:
17/12/2025
RiteCMS v3.1.0 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the parse_special_tags() function.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-66924

Publication date:
17/12/2025
A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-65203

Publication date:
17/12/2025
KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials into documents rendered under a browser-enforced CSP directive and iframe attribute sandbox, allowing attacker-controlled script in the sandboxed document to access populated form fields and exfiltrate credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-66923

Publication date:
17/12/2025
A Cross-site scripting (XSS) vulnerability in Create/Update Customer(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the phone_number parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-67165

Publication date:
17/12/2025
An Insecure Direct Object Reference (IDOR) in Pagekit CMS v1.0.18 allows attackers to escalate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-67285

Publication date:
17/12/2025
A SQL injection vulnerability was found in the '/cts/admin/?page=zone' file of ITSourcecode COVID Tracking System Using QR-Code v1.0. The reason for this issue is that attackers inject malicious code from the parameter 'id' and use it directly in SQL queries without the need for appropriate cleaning or validation.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-53398

Publication date:
17/12/2025
The Portrait Dell Color Management application 3.3.8 for Dell monitors has Insecure Permissions,
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025