Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-4417

Publication date:
12/06/2025
A cross-site scripting vulnerability exists in <br /> AVEVA PI Connector for CygNet <br /> Versions 1.6.14 and prior that, if exploited, could allow an <br /> administrator miscreant with local access to the connector admin portal <br /> to persist arbitrary JavaScript code that will be executed by other <br /> users who visit affected pages.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-4418

Publication date:
12/06/2025
An improper validation of integrity check value vulnerability exists in <br /> <br /> AVEVA PI Connector for CygNet Versions 1.6.14 and prior that, if exploited, <br /> could allow a miscreant with elevated privileges to modify PI Connector <br /> for CygNet local data files (cache and buffers) in a way that causes the<br /> connector service to become unresponsive.
Severity CVSS v4.0: MEDIUM
Last modification:
16/06/2025

CVE-2025-49575

Publication date:
12/06/2025
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Multiple system messages are inserted into the CommandPaletteFooter as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-49576

Publication date:
12/06/2025
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. The citizen-search-noresults-title and citizen-search-noresults-desc system messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This vulnerability is fixed in 3.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-49577

Publication date:
12/06/2025
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Various preferences messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This vulnerability is fixed in 3.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-49578

Publication date:
12/06/2025
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Various date messages returned by `Language::userDate` are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-49579

Publication date:
12/06/2025
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. All system messages in menu headings using the Menu.mustache template are inserted as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2025

CVE-2025-43863

Publication date:
12/06/2025
vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. If attacker gets access to an authenticated session, they can try to brute-force the user password by using the change password functionality: they can call that route infinitely which will return the message that password is wrong until it is correct. This vulnerability is fixed in 4.11.
Severity CVSS v4.0: LOW
Last modification:
17/09/2025

CVE-2025-43866

Publication date:
12/06/2025
vantage6 is an open-source infrastructure for privacy preserving analysis. The JWT secret key in the vantage6 server is auto-generated unless defined by the user. The auto-generated key is a UUID1, which is not cryptographically secure as it is predictable to some extent. This vulnerability is fixed in 4.11.0.
Severity CVSS v4.0: LOW
Last modification:
17/09/2025

CVE-2025-49081

Publication date:
12/06/2025
There is an insufficient input validation vulnerability in the warehouse<br /> component of Absolute Secure Access prior to server version 13.55. Attackers<br /> with system administrator permissions can impair the availability of the Secure<br /> Access administrative UI by writing invalid data to the warehouse over the<br /> network. The attack complexity is low, there are no attack requirements,<br /> privileges required are high, and there is no user interaction required. There<br /> is no impact on confidentiality or integrity; the impact on availability is<br /> high.
Severity CVSS v4.0: MEDIUM
Last modification:
17/06/2025

CVE-2025-49080

Publication date:
12/06/2025
There is a memory management vulnerability in Absolute<br /> Secure Access server versions 9.0 to 13.54. Attackers with network access to<br /> the server can cause a Denial of Service by sending a specially crafted<br /> sequence of packets to the server. The attack complexity is low, there are no<br /> attack requirements, privileges, or user interaction required. Loss of<br /> availability is high; there is no impact on confidentiality or integrity.
Severity CVSS v4.0: HIGH
Last modification:
23/06/2025

CVE-2025-5982

Publication date:
12/06/2025
An issue has been discovered in GitLab EE affecting all versions from 12.0 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2. Under certain conditions users could bypass IP access restrictions and view sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2025