Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-36745

Publication date:
12/12/2025
SolarEdge SE3680H  ships with an outdated Linux kernel containing unpatched vulnerabilities in core subsystems. An attacker with network or local access can exploit these flaws to achieve remote code execution, privilege escalation, or disclosure of sensitive information.
Severity CVSS v4.0: HIGH
Last modification:
12/12/2025

CVE-2025-36746

Publication date:
12/12/2025
SolarEdge monitoring platform contains a Cross‑Site Scripting (XSS) flaw that allows an authenticated user to inject payloads into report names, which may execute in a victim’s browser during a deletion attempt.
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-36755

Publication date:
12/12/2025
The CleverDisplay BlueOne hardware player is designed with its USB interfaces physically enclosed and inaccessible under normal operating conditions. Researchers demonstrated that, after cicumventing the device’s protective enclosure, it was possible to connect a USB keyboard and press ESC during boot to access the BIOS setup interface. BIOS settings could be viewed but not modified. This behavior slightly increases the attack surface by exposing internal system information (CWE-1244) once the enclosure is removed, but does not allow integrity or availability compromise under standard or tested configurations.
Severity CVSS v4.0: LOW
Last modification:
12/12/2025

CVE-2025-58770

Publication date:
12/12/2025
APTIOV contains a vulnerability in BIOS where a user may cause “Improper Handling of Insufficient Permissions or Privileges” by local access. Successful exploitation of this vulnerability can lead to escalation of authorization and potentially impact Integrity and Availability.
Severity CVSS v4.0: HIGH
Last modification:
12/12/2025

CVE-2025-54947

Publication date:
12/12/2025
In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Attackers may obtain this key through reverse engineering or code analysis, potentially decrypting sensitive data or forging encrypted information, leading to information disclosure or unauthorized system access.<br /> <br /> This issue affects Apache StreamPark: from 2.0.0 before 2.1.7.<br /> <br /> Users are recommended to upgrade to version 2.1.7, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-54981

Publication date:
12/12/2025
Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data<br /> <br /> This issue affects Apache StreamPark: from 2.0.0 before 2.1.7.<br /> <br /> Users are recommended to upgrade to version 2.1.7, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-36743

Publication date:
12/12/2025
SolarEdge SE3680H has an exposed debug/test interface accessible to unauthenticated actors, allowing disclosure of system internals and execution of debug commands.
Severity CVSS v4.0: HIGH
Last modification:
12/12/2025

CVE-2025-13506

Publication date:
12/12/2025
Execution with Unnecessary Privileges vulnerability in Nebim Neyir Computer Industry and Services Inc. Nebim V3 ERP allows Expanding Control over the Operating System from the Database.This issue affects Nebim V3 ERP: from 2.0.59 before 3.0.1.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-14065

Publication date:
12/12/2025
The Simple Bike Rental plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the &amp;#39;simpbire_carica_prenotazioni&amp;#39; AJAX action in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve all booking records containing customers&amp;#39; personally identifiable information (PII), including names, email addresses, and phone numbers.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-14159

Publication date:
12/12/2025
The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.9.2. This is due to missing nonce validation on the &amp;#39;ays_sccp_results_export_file&amp;#39; AJAX action. This makes it possible for unauthenticated attackers to export sensitive plugin data including email addresses, IP addresses, physical addresses, user IDs, and other user information via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The exported data is stored in a publicly accessible file, allowing attackers to receive the sensitive information even though they are not authenticated.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-14442

Publication date:
12/12/2025
The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to sensitive information exposure due to storage of exported CSV files in a publicly accessible directory with predictable filenames in all versions up to, and including, 4.9.2. This makes it possible for unauthenticated attackers to access sensitive user data including emails, IP addresses, usernames, roles, and location data by directly accessing the exported CSV file.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-12408

Publication date:
12/12/2025
The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 7.2.2.2 via the &amp;#39;get_location&amp;#39; action due to insufficient restrictions on which locations can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft event locations that they should not have access to.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025