Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-25023

Publication date:
09/04/2025
IBM Security Guardium 11.4 and 12.1 could allow a privileged user to read any file on the system due to incorrect privilege assignment.
Severity CVSS v4.0: Pending analysis
Last modification:
20/06/2025

CVE-2023-33844

Publication date:
09/04/2025
IBM Security Verify Governance 10.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2025

CVE-2025-1968

Publication date:
09/04/2025
Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-29189

Publication date:
09/04/2025
Flowise
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2025-30677

Publication date:
09/04/2025
Apache Pulsar contains multiple connectors for integrating with Apache Kafka. The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect Adaptor Sink Connector log sensitive configuration properties in plain text in application logs.<br /> <br /> <br /> This vulnerability can lead to unintended exposure of credentials in log files, potentially allowing attackers with access to these logs to obtain Apache Kafka credentials. The vulnerability&amp;#39;s impact is limited by the fact that an attacker would need access to the application logs to exploit this issue.<br /> <br /> This issue affects Apache Pulsar IO&amp;#39;s Apache Kafka connectors in all versions before 3.0.11, 3.3.6, and 4.0.4.<br /> <br /> <br /> 3.0.x version users should upgrade to at least 3.0.11.<br /> <br /> 3.3.x version users should upgrade to at least 3.3.6.<br /> <br /> 4.0.x version users should upgrade to at least 4.0.4.<br /> <br /> <br /> Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
Severity CVSS v4.0: MEDIUM
Last modification:
15/07/2025

CVE-2025-31672

Publication date:
09/04/2025
Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry.<br /> This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file.<br /> Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2025

CVE-2025-2222

Publication date:
09/04/2025
CWE-552: Files or Directories Accessible to External Parties vulnerability over https exists that could leak<br /> information and potential privilege escalation following man in the middle attack.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-2223

Publication date:
09/04/2025
CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and<br /> Availability of engineering workstation when a malicious project file is loaded by a user from the local system.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-2440

Publication date:
09/04/2025
CWE-922: Insecure Storage of Sensitive Information vulnerability exists that could potentially lead to unauthorized<br /> access of confidential data when a malicious user, having physical access and advanced information on the file<br /> system, sets the radio in factory default mode.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-2441

Publication date:
09/04/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of<br /> confidentiality when a malicious user, having physical access, sets the radio in factory default mode where the<br /> product does not correctly initialize all data.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-2442

Publication date:
09/04/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to<br /> unauthorized access which could result in the loss of confidentially, integrity and availability when a malicious<br /> user, having physical access, sets the radio to the factory default mode.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2017-20197

Publication date:
09/04/2025
A vulnerability was found in propanetank Roommate-Bill-Tracking up to 288437f658fc9ee7d4b92a9da12557024d8bc55c. It has been declared as critical. This vulnerability affects unknown code of the file /includes/login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The name of the patch is b32bb1b940f82d38fb9310cd66ebe349e20a1d0a. It is recommended to apply a patch to fix this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026