Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-65840

Publication date:
01/12/2025
PublicCMS V5.202506.b is vulnerable to Cross Site Request Forgery (CSRF) in the CkEditorAdminController.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-65621

Publication date:
01/12/2025
Snipe-IT before 8.3.4 allows stored XSS, allowing a low-privileged authenticated user to inject JavaScript that executes in an administrator's session, enabling privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-58044

Publication date:
01/12/2025
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
Severity CVSS v4.0: MEDIUM
Last modification:
05/12/2025

CVE-2025-55749

Publication date:
01/12/2025
XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.
Severity CVSS v4.0: HIGH
Last modification:
06/02/2026

CVE-2024-51999

Publication date:
01/12/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error and is not a valid vulnerability. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: LOW
Last modification:
02/12/2025

CVE-2025-65838

Publication date:
01/12/2025
PublicCMS V5.202506.b is vulnerable to path traversal via the doUploadSitefile method.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-65836

Publication date:
01/12/2025
PublicCMS V5.202506.b is vulnerable to SSRF. in the chat interface of SimpleAiAdminController.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-63317

Publication date:
01/12/2025
Todoist v8896 is vulnerable to Cross Site Scripting (XSS) in /api/v1/uploads. Uploaded SVG files have no sanitization applied, so embedded JavaScript executes when a user opens the attachment from a task/comment.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-51683

Publication date:
01/12/2025
A blind SQL Injection (SQLi) vulnerability in mJobtime v15.7.2 allows unauthenticated attackers to execute arbitrary SQL statements via a crafted POST request to the /Default.aspx/update_profile_Server endpoint .
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-51682

Publication date:
01/12/2025
mJobtime 15.7.2 handles authorization on the client side, which allows an attacker to modify the client-side code and gain access to administrative features. Additionally, they can craft requests based on the client-side code to call these administrative functions directly.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-12756

Publication date:
01/12/2025
Mattermost versions 11.0.x
Severity CVSS v4.0: Pending analysis
Last modification:
05/12/2025

CVE-2025-65407

Publication date:
01/12/2025
A use-after-free in the MPEG1or2Demux::newElementaryStream() function of Live555 Streaming Media v2018.09.02 allows attackers to cause a Denial of Service (DoS) via supplying a crafted MPEG Program stream.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025