Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-53950

Publication date:
16/10/2025
An Exposure of Private Personal Information ('Privacy Violation') vulnerability [CWE-359] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS and Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1. through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated administrator to collect current user's email information.
Severity CVSS v4.0: Pending analysis
Last modification:
16/10/2025

CVE-2025-11839

Publication date:
16/10/2025
A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.
Severity CVSS v4.0: MEDIUM
Last modification:
06/11/2025

CVE-2025-9955

Publication date:
16/10/2025
An improper access control vulnerability exists in WSO2 Enterprise Integrator product due to insufficient permission restrictions on internal SOAP admin services related to system logs and user-store configuration. A low-privileged user can access log data and user-store configuration details that are not intended to be exposed at that privilege level.<br /> <br /> While no credentials or sensitive user information are exposed, this vulnerability may allow unauthorized visibility into internal operational details, which could aid in further exploitation or reconnaissance.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2025

CVE-2025-9804

Publication date:
16/10/2025
An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information.<br /> <br /> This vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager&amp;#39;s API Gateway remain unaffected.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-9152

Publication date:
16/10/2025
An improper privilege management vulnerability exists in WSO2 API Manager due to missing authentication and authorization checks in the keymanager-operations Dynamic Client Registration (DCR) endpoint.<br /> <br /> A malicious user can exploit this flaw to generate access tokens with elevated privileges, potentially leading to administrative access and the ability to perform unauthorized operations.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2025

CVE-2025-10611

Publication date:
16/10/2025
Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation.<br /> <br /> Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2025

CVE-2025-3930

Publication date:
16/10/2025
Strapi uses JSON Web Tokens (JWT) for authentication. After logout or account deactivation, the JWT is not invalidated, which allows an attacker who has stolen or intercepted the token to freely reuse it until its expiration date (which is set to 30 days by default, but can be changed). <br /> The existence of /admin/renew-token endpoint allows anyone to renew near-expiration tokens indefinitely, further increasing the impact of this attack. <br /> <br /> This issue has been fixed in version 5.24.1.
Severity CVSS v4.0: MEDIUM
Last modification:
22/10/2025

CVE-2025-6338

Publication date:
16/10/2025
There is an incomplete cleanup vulnerability in Qt Network&amp;#39;s Schannel support on Windows which can lead to a Denial of Service over a long period.This issue affects Qt from 5.15.0 through 6.8.3, from 6.9.0 before 6.9.2.
Severity CVSS v4.0: CRITICAL
Last modification:
16/10/2025

CVE-2025-55072

Publication date:
16/10/2025
Stored cross-site scripting (XSS) vulnerability in desknet&amp;#39;s NEO V2.0R1.0 to V9.0R2.0 allow execution of arbitrary JavaScript in a user’s web browser.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025

CVE-2025-58079

Publication date:
16/10/2025
Improper Protection of Alternate Path (CWE-424) in the AppSuite of desknet&amp;#39;s NEO V4.0R1.0 to V9.0R2.0 allows an attacker to create malicious AppSuite applications.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025

CVE-2025-58426

Publication date:
16/10/2025
desknet&amp;#39;s NEO V4.0R1.0 to V9.0R2.0 contains a hard-coded cryptographic key, which allows an attacker to create malicious AppSuite applications.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025

CVE-2025-54760

Publication date:
16/10/2025
Stored cross-site scripting (XSS) vulnerability in desknet&amp;#39;s NEO V9.0R2.0 and earlier allow execution of arbitrary JavaScript in a user’s web browser.
Severity CVSS v4.0: MEDIUM
Last modification:
16/10/2025