Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-64280

Publication date:
12/11/2025
A SQL Injection Vulnerability in CentralSquare Community Development 19.5.7 allows attackers to inject SQL via the permit_no field.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2025-63353

Publication date:
12/11/2025
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2025-63289

Publication date:
12/11/2025
Sogexia Android App Compile Affected SDK v35, Max SDK 32 and fixed in v36, was discovered to contain hardcoded encryption keys in the encryption_helper.dart file
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2026

CVE-2025-12068

Publication date:
12/11/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-12152

Publication date:
12/11/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-11367

Publication date:
12/11/2025
The N-central Software Probe
Severity CVSS v4.0: CRITICAL
Last modification:
14/11/2025

CVE-2025-11366

Publication date:
12/11/2025
N-central
Severity CVSS v4.0: CRITICAL
Last modification:
14/11/2025

CVE-2025-11700

Publication date:
12/11/2025
N-central versions
Severity CVSS v4.0: HIGH
Last modification:
15/12/2025

CVE-2025-63667

Publication date:
12/11/2025
Incorrect access control in SIMICAM v1.16.41-20250725, KEVIEW v1.14.92-20241120, ASECAM v1.14.10-20240725 allows attackers to access sensitive API endpoints without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2026

CVE-2025-63666

Publication date:
12/11/2025
Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2025

CVE-2025-11566

Publication date:
12/11/2025
CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker on the local network to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on the /REST/shutdownnow endpoint.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-11567

Publication date:
12/11/2025
CWE-276: Incorrect Default Permissions vulnerability exists that could cause elevated system access when the target installation folder is not properly secured.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026