Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-66518

Publication date:
05/01/2026
Any client who can access to Apache Kyuubi Server via Kyuubi frontend protocols can bypass server-side config kyuubi.session.local.dir.allow.list and use local files which are not listed in the config.<br /> <br /> This issue affects Apache Kyuubi: from 1.6.0 through 1.10.2.<br /> <br /> Users are recommended to upgrade to version 1.10.3 or upper, which fixes the issue.
Severity CVSS v4.0: HIGH
Last modification:
27/01/2026

CVE-2026-0581

Publication date:
05/01/2026
A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this issue is the function formBehaviorManager of the file /goform/BehaviorManager of the component httpd. Executing a manipulation of the argument modulename/option/data/switch can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2026-0580

Publication date:
05/01/2026
A vulnerability was found in SourceCodester API Key Manager App 1.0. Affected by this vulnerability is an unknown functionality of the component Import Key Handler. Performing a manipulation results in cross site scripting. The attack can be initiated remotely.
Severity CVSS v4.0: LOW
Last modification:
29/04/2026

CVE-2025-15238

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.
Severity CVSS v4.0: HIGH
Last modification:
20/01/2026

CVE-2025-15235

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Missing Authorization vulnerability, allowing authenticated remote attackers to modify specific network packet parameters, enabling certain system functions to access other users&amp;#39; files.
Severity CVSS v4.0: HIGH
Last modification:
20/01/2026

CVE-2025-15237

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Path Traversal vulnerability, allowing authenticated remote attackers to read folder names under the specified path by exploiting an Absolute Path Traversal vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-15236

Publication date:
05/01/2026
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has a Path Traversal vulnerability, allowing authenticated remote attackers to read folder names under the specified path by exploiting an Absolute Path Traversal vulnerability.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-15022

Publication date:
05/01/2026
Action captions in Vaadin accept HTML by default but were not sanitized, potentially allowing Cross-site Scripting (XSS) if caption content is derived from user input.<br /> <br /> In Vaadin Framework 7 and 8, the Action class is a general-purpose class that may be used by multiple components. The fixed versions sanitize captions by default and provide an API to explicitly enable HTML content mode for backwards compatibility.<br /> <br /> In Vaadin 23 and newer, the Action class is only used by the Spreadsheet component. The fixed versions sanitize HTML using Jsoup with a relaxed safelist.<br /> <br /> Vaadin 14 is not affected as Spreadsheet component was not supported.<br /> <br /> Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:<br /> <br /> Product version<br /> Vaadin 7.0.0 - 7.7.49<br /> Vaadin 8.0.0 - 8.29.1<br /> Vaadin 23.1.0 - 23.6.5<br /> Vaadin 24.0.0 - 24.8.13<br /> Vaadin 24.9.0 - 24.9.6<br /> <br /> Mitigation<br /> Upgrade to 7.7.50<br /> Upgrade to 8.30.0<br /> Upgrade to 23.6.6<br /> Upgrade to 24.8.14 or 24.9.7<br /> Upgrade to 25.0.0 or newer<br /> <br /> Artifacts     Maven coordinatesVulnerable versionsFixed versioncom.vaadin:vaadin-server<br /> 7.0.0 - 7.7.49<br /> ≥7.7.50<br /> com.vaadin:vaadin-server<br /> 8.0.0 - 8.29.1<br /> ≥8.30.0<br /> com.vaadin:vaadin<br /> 23.1.0 - 23.6.5<br /> ≥23.6.6<br /> com.vaadin:vaadin24.0.0 - 24.8.13<br /> ≥24.8.14<br /> com.vaadin:vaadin24.9.0 - 24.9.6<br /> ≥24.9.7<br /> com.vaadin:vaadin-spreadsheet-flow<br /> 23.1.0 - 23.6.5<br /> ≥23.6.6<br /> com.vaadin:vaadin-spreadsheet-flow<br /> 24.0.0 - 24.8.13<br /> ≥24.8.14<br /> com.vaadin:vaadin-spreadsheet-flow<br /> 24.9.0 - 24.9.6<br /> ≥24.9.7
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-15462

Publication date:
05/01/2026
A vulnerability has been found in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of the file /goform/ConfigAdvideo. The manipulation of the argument timestart leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
12/01/2026

CVE-2025-15461

Publication date:
05/01/2026
A flaw has been found in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTaskEdit. Executing a manipulation of the argument selDateType can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
12/01/2026

CVE-2025-9543

Publication date:
05/01/2026
The FlexTable WordPress plugin before 3.19.2 does not sanitise and escape the imported links from Google Sheet cells, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-15459

Publication date:
05/01/2026
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. Affected by this issue is the function strcpy of the file /goform/formUser. Such manipulation of the argument passwd1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
12/01/2026