Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-59987

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the arbitrary device search field that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59986

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the input fields in Model Devices that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59985

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in a field on the Purging Policy page that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59984

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in Global Search that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59989

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Device Discovery page that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.<br /> This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59980

Publication date:
09/10/2025
An Authentication Bypass by Primary Weakness<br /> <br /> in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device.<br /> When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and then has read-write access to their home directory.<br /> <br /> This issue affects Junos OS: <br /> <br /> <br /> <br /> * all versions before 22.4R3-S8,<br /> * 23.2 versions before 23.2R2-S3,<br /> * 23.4 versions before 23.4R2.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59982

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the dashboard search field that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59981

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Device Template Definition page that, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-59978

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to store script tags directly in web pages that, when viewed by another user, enable the attacker to execute commands with the target&amp;#39;s administrative permissions.<br /> This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: CRITICAL
Last modification:
23/01/2026

CVE-2025-59983

Publication date:
09/10/2025
An Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Template Definition page, when visited by another user, enables the attacker to execute commands with the target&amp;#39;s permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-11549

Publication date:
09/10/2025
A vulnerability has been found in Tenda W12 3.0.0.6(3948). The affected element is the function wifiMacFilterSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument mac leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
18/10/2025

CVE-2025-11371

Publication date:
09/10/2025
In the default installation and configuration of Gladinet CentreStack and TrioFox, there is an unauthenticated Local File Inclusion Flaw that allows unintended disclosure of system files. Exploitation of this vulnerability has been observed in the wild. <br /> <br /> This issue impacts Gladinet CentreStack and Triofox: All versions prior to and including 16.7.10368.56560
Severity CVSS v4.0: Pending analysis
Last modification:
05/11/2025