Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-62354

Publication date:
26/11/2025
Improper neutralization of special elements used in an OS command ('command injection') in Cursor allows an unauthorized attacker to execute commands that are outside of those specified in the allowlist, resulting in arbitrary code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-50402

Publication date:
26/11/2025
FAST FAC1200R F400_FAC1200R_Q is vulnerable to Buffer Overflow in the function sub_80435780 via the parameter string fac_password.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-56396

Publication date:
26/11/2025
An issue was discovered in Ruoyi 4.8.1 allowing attackers to gain escalated privileges due to the owning department having higher rights than the active user.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-3747

Publication date:
26/11/2025
Rejected reason: This CVE ID was duplicated of CVE-2025-32801
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-45311

Publication date:
26/11/2025
Insecure permissions in fail2ban-client v0.11.2 allows attackers with limited sudo privileges to perform arbitrary operations as root.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-46174

Publication date:
26/11/2025
Ruoyi v4.8.0 vulnerable to Incorrect Access Control. There is a missing checkUserDataScope permission check in the resetPwd Method of SysUserController.java.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-50399

Publication date:
26/11/2025
FAST FAC1200R F400_FAC1200R_Q is vulnerable to Buffer Overflow in the function sub_80435780 via the parameter password.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-13601

Publication date:
26/11/2025
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-9163

Publication date:
26/11/2025
The Houzez theme for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.1.6 due to insufficient input sanitization and output escaping in the houzez_property_img_upload() and houzez_property_attachment_upload() functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-9191

Publication date:
26/11/2025
The Houzez theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.1.6 via deserialization of untrusted input in saved-search-item.php. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-13674

Publication date:
26/11/2025
BPv7 dissector crash in Wireshark 4.6.0 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-59390

Publication date:
26/11/2025
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`,<br /> which is not a crypto-graphically secure random number generator. This <br /> may allow an attacker to predict or brute force the secret used to sign <br /> authentication cookies, potentially enabling token forgery or <br /> authentication bypass. Additionally, each process generates its own <br /> fallback secret, resulting in inconsistent secrets across nodes. This <br /> causes authentication failures in distributed or multi-broker <br /> deployments, effectively leading to a incorrectly configured clusters. Users are <br /> advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret`<br /> <br /> <br /> <br /> This issue affects Apache Druid: through 34.0.0.<br /> <br /> Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025