Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-4922

Publication date:
11/06/2025
Nomad Community and Nomad Enterprise (“Nomad”) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2025

CVE-2025-4605

Publication date:
11/06/2025
A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a denial-of-service (DoS), or cause data corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2025

CVE-2025-40914

Publication date:
11/06/2025
Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow.<br /> <br /> CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-35941

Publication date:
11/06/2025
A password is exposed locally.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-32711

Publication date:
11/06/2025
Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2026

CVE-2025-5144

Publication date:
11/06/2025
The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-date-*’ parameters in all versions up to, and including, 6.13.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2025

CVE-2025-5687

Publication date:
11/06/2025
A vulnerability in Mozilla VPN on macOS allows privilege escalation from a normal user to root.<br /> *This bug only affects Mozilla VPN on macOS. Other operating systems are unaffected.*. This vulnerability was fixed in Mozilla VPN 2.28.0 (macOS).
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-5986

Publication date:
11/06/2025
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user&amp;#39;s desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability was fixed in Thunderbird 128.11.1 and Thunderbird 139.0.2.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-49710

Publication date:
11/06/2025
An integer overflow was present in `OrderedHashTable` used by the JavaScript engine. This vulnerability was fixed in Firefox 139.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-49709

Publication date:
11/06/2025
Certain canvas operations could have lead to memory corruption. This vulnerability was fixed in Firefox 139.0.4.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2025-3302

Publication date:
11/06/2025
The Xagio SEO – AI Powered SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘HTTP_REFERER’ parameter in all versions up to, and including, 7.1.0.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 7.1.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-4128

Publication date:
11/06/2025
Mattermost versions 10.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
08/07/2025