Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-30677

Publication date:
09/04/2025
Apache Pulsar contains multiple connectors for integrating with Apache Kafka. The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect Adaptor Sink Connector log sensitive configuration properties in plain text in application logs.<br /> <br /> <br /> This vulnerability can lead to unintended exposure of credentials in log files, potentially allowing attackers with access to these logs to obtain Apache Kafka credentials. The vulnerability&amp;#39;s impact is limited by the fact that an attacker would need access to the application logs to exploit this issue.<br /> <br /> This issue affects Apache Pulsar IO&amp;#39;s Apache Kafka connectors in all versions before 3.0.11, 3.3.6, and 4.0.4.<br /> <br /> <br /> 3.0.x version users should upgrade to at least 3.0.11.<br /> <br /> 3.3.x version users should upgrade to at least 3.3.6.<br /> <br /> 4.0.x version users should upgrade to at least 4.0.4.<br /> <br /> <br /> Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
Severity CVSS v4.0: MEDIUM
Last modification:
15/07/2025

CVE-2025-31672

Publication date:
09/04/2025
Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.<br /> This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.<br /> Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2025

CVE-2025-2222

Publication date:
09/04/2025
CWE-552: Files or Directories Accessible to External Parties vulnerability over https exists that could leak<br /> information and potential privilege escalation following man in the middle attack.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-2223

Publication date:
09/04/2025
CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and<br /> Availability of engineering workstation when a malicious project file is loaded by a user from the local system.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-2440

Publication date:
09/04/2025
CWE-922: Insecure Storage of Sensitive Information vulnerability exists that could potentially lead to unauthorized<br /> access of confidential data when a malicious user, having physical access and advanced information on the file<br /> system, sets the radio in factory default mode.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-2441

Publication date:
09/04/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of<br /> confidentiality when a malicious user, having physical access, sets the radio in factory default mode where the<br /> product does not correctly initialize all data.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-2442

Publication date:
09/04/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to<br /> unauthorized access which could result in the loss of confidentially, integrity and availability when a malicious<br /> user, having physical access, sets the radio to the factory default mode.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2017-20197

Publication date:
09/04/2025
A vulnerability was found in propanetank Roommate-Bill-Tracking up to 288437f658fc9ee7d4b92a9da12557024d8bc55c. It has been declared as critical. This vulnerability affects unknown code of the file /includes/login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The name of the patch is b32bb1b940f82d38fb9310cd66ebe349e20a1d0a. It is recommended to apply a patch to fix this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-27934

Publication date:
09/04/2025
Information disclosure of authentication information in the specific service vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a remote unauthenticated attacker may obtain the product authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-29870

Publication date:
09/04/2025
Missing authentication for critical function vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a remote unauthenticated attacker may obtain the product configuration information including authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-25053

Publication date:
09/04/2025
OS command injection vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-25056

Publication date:
09/04/2025
Cross-site request forgery vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If a user views a malicious page while logged in, unintended operations may be performed.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026