Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-63289

Publication date:
12/11/2025
Sogexia Android App Compile Affected SDK v35, Max SDK 32 and fixed in v36, was discovered to contain hardcoded encryption keys in the encryption_helper.dart file
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2026

CVE-2025-12068

Publication date:
12/11/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-12152

Publication date:
12/11/2025
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
12/11/2025

CVE-2025-11367

Publication date:
12/11/2025
The N-central Software Probe
Severity CVSS v4.0: CRITICAL
Last modification:
14/11/2025

CVE-2025-11366

Publication date:
12/11/2025
N-central
Severity CVSS v4.0: CRITICAL
Last modification:
14/11/2025

CVE-2025-11700

Publication date:
12/11/2025
N-central versions
Severity CVSS v4.0: HIGH
Last modification:
15/12/2025

CVE-2025-63666

Publication date:
12/11/2025
Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.
Severity CVSS v4.0: Pending analysis
Last modification:
17/11/2025

CVE-2025-63667

Publication date:
12/11/2025
Incorrect access control in SIMICAM v1.16.41-20250725, KEVIEW v1.14.92-20241120, ASECAM v1.14.10-20240725 allows attackers to access sensitive API endpoints without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2026

CVE-2025-11566

Publication date:
12/11/2025
CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker on the local network to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on the /REST/shutdownnow endpoint.
Severity CVSS v4.0: MEDIUM
Last modification:
12/11/2025

CVE-2025-11567

Publication date:
12/11/2025
CWE-276: Incorrect Default Permissions vulnerability exists that could cause elevated system access when the target installation folder is not properly secured.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-11565

Publication date:
12/11/2025
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST /REST/UpdateJRE request payload.
Severity CVSS v4.0: HIGH
Last modification:
12/11/2025

CVE-2025-62876

Publication date:
12/11/2025
A Execution with Unnecessary Privileges vulnerability in lightdm-kde-greeter allows escalation from the service user to root.This issue affects lightdm-kde-greeter. before 6.0.4.
Severity CVSS v4.0: MEDIUM
Last modification:
17/11/2025