Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-15238

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.
Severity CVSS v4.0: HIGH
Last modification:
05/01/2026

CVE-2025-15022

Publication date:
05/01/2026
Action captions in Vaadin accept HTML by default but were not sanitized, potentially allowing Cross-site Scripting (XSS) if caption content is derived from user input.<br /> <br /> In Vaadin Framework 7 and 8, the Action class is a general-purpose class that may be used by multiple components. The fixed versions sanitize captions by default and provide an API to explicitly enable HTML content mode for backwards compatibility.<br /> <br /> In Vaadin 23 and newer, the Action class is only used by the Spreadsheet component. The fixed versions sanitize HTML using Jsoup with a relaxed safelist.<br /> <br /> Vaadin 14 is not affected as Spreadsheet component was not supported.<br /> <br /> Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:<br /> <br /> Product version<br /> Vaadin 7.0.0 - 7.7.49<br /> Vaadin 8.0.0 - 8.29.1<br /> Vaadin 23.1.0 - 23.6.5<br /> Vaadin 24.0.0 - 24.8.13<br /> Vaadin 24.9.0 - 24.9.6<br /> <br /> Mitigation<br /> Upgrade to 7.7.50<br /> Upgrade to 8.30.0<br /> Upgrade to 23.6.6<br /> Upgrade to 24.8.14 or 24.9.7<br /> Upgrade to 25.0.0 or newer<br /> <br /> Artifacts     Maven coordinatesVulnerable versionsFixed versioncom.vaadin:vaadin-server<br /> 7.0.0 - 7.7.49<br /> ≥7.7.50<br /> com.vaadin:vaadin-server<br /> 8.0.0 - 8.29.1<br /> ≥8.30.0<br /> com.vaadin:vaadin<br /> 23.1.0 - 23.6.5<br /> ≥23.6.6<br /> com.vaadin:vaadin24.0.0 - 24.8.13<br /> ≥24.8.14<br /> com.vaadin:vaadin24.9.0 - 24.9.6<br /> ≥24.9.7<br /> com.vaadin:vaadin-spreadsheet-flow<br /> 23.1.0 - 23.6.5<br /> ≥23.6.6<br /> com.vaadin:vaadin-spreadsheet-flow<br /> 24.0.0 - 24.8.13<br /> ≥24.8.14<br /> com.vaadin:vaadin-spreadsheet-flow<br /> 24.9.0 - 24.9.6<br /> ≥24.9.7
Severity CVSS v4.0: MEDIUM
Last modification:
05/01/2026

CVE-2025-15462

Publication date:
05/01/2026
A vulnerability has been found in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/ConfigAdvideo. The manipulation of the argument timestart leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
05/01/2026

CVE-2025-15461

Publication date:
05/01/2026
A flaw has been found in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTaskEdit. Executing a manipulation of the argument selDateType can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
06/01/2026

CVE-2025-9543

Publication date:
05/01/2026
The FlexTable WordPress plugin before 3.19.2 does not sanitise and escape the imported links from Google Sheet cells, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2026

CVE-2025-15459

Publication date:
05/01/2026
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected by this issue is the function strcpy of the file /goform/formUser. Such manipulation of the argument passwd1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
06/01/2026

CVE-2025-15460

Publication date:
05/01/2026
A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formPptpClientConfig. Performing a manipulation of the argument EncryptionMode results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
06/01/2026

CVE-2025-14124

Publication date:
05/01/2026
The Team WordPress plugin before 5.0.11 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2026

CVE-2025-15458

Publication date:
05/01/2026
A vulnerability was determined in bg5sbk MiniCMS up to 1.8. This affects an unknown function of the file /mc-admin/post-edit.php of the component Article Handler. Executing a manipulation can lead to improper authentication. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
06/01/2026

CVE-2025-15457

Publication date:
05/01/2026
A vulnerability was found in bg5sbk MiniCMS up to 1.8. The impacted element is an unknown function of the file /minicms/mc-admin/post.php of the component Trash File Restore Handler. Performing a manipulation results in improper authentication. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
05/01/2026

CVE-2025-15456

Publication date:
05/01/2026
A vulnerability has been found in bg5sbk MiniCMS up to 1.8. The affected element is an unknown function of the file /mc-admin/page-edit.php of the component Publish Page Handler. Such manipulation leads to improper authentication. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The existence of this vulnerability is still disputed at present. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
05/01/2026

CVE-2025-15455

Publication date:
05/01/2026
A flaw has been found in bg5sbk MiniCMS up to 1.8. Impacted is the function delete_page of the file /minicms/mc-admin/page.php of the component File Recovery Request Handler. This manipulation causes improper authentication. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
05/01/2026