Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-13053

Publication date:
12/12/2025
When a user configures the NAS to retrieve UPS status or control the UPS, a non-enforced TLS certificate verification can allow an attacker able to intercept network traffic between the client and server can perform a man-in-the-middle (MITM) attack, which may obtain the sensitive information of the UPS server configuation.<br /> <br /> This issue affects ADM: from 4.1.0 through 4.3.3.RKD2, from 5.0.0 through 5.1.0.RN42.
Severity CVSS v4.0: HIGH
Last modification:
12/12/2025

CVE-2025-13665

Publication date:
12/12/2025
The System Console Utility for Windows is vulnerable to a DLL planting vulnerability
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-13669

Publication date:
12/12/2025
Uncontrolled Search Path Element vulnerability in Altera High Level Synthesis Compiler on Windows allows Search Order Hijacking.This issue affects High Level Synthesis Compiler: from 19.1 through 24.3.
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-13670

Publication date:
12/12/2025
The High Level Synthesis Compiler i++ command for Windows is vulnerable to a DLL planting vulnerability
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-13052

Publication date:
12/12/2025
When the user set the Notification&amp;#39;s sender to send emails to the SMTP server via msmtp, an improper validated TLS/SSL certificates allows an attacker who can intercept network traffic between the SMTP client and server to execute a man-in-the-middle (MITM) attack, which may obtain the sensitive information of the SMTP.<br /> <br /> Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.RKD2 as well as from ADM 5.0.0 through ADM 5.1.0.RN42.
Severity CVSS v4.0: HIGH
Last modification:
12/12/2025

CVE-2025-10451

Publication date:
12/12/2025
Unchecked output buffer may allowed arbitrary code execution in SMM and potentially result in SMM memory corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-67779

Publication date:
12/12/2025
It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-67780

Publication date:
11/12/2025
SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker&amp;#39;s ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-66451

Publication date:
11/12/2025
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
Severity CVSS v4.0: MEDIUM
Last modification:
11/12/2025

CVE-2025-66452

Publication date:
11/12/2025
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn&amp;#39;t strictly enforced. This issue does not have a fix at the time of publication.
Severity CVSS v4.0: MEDIUM
Last modification:
11/12/2025

CVE-2025-66450

Publication date:
11/12/2025
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
Severity CVSS v4.0: HIGH
Last modification:
11/12/2025

CVE-2025-64721

Publication date:
11/12/2025
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
Severity CVSS v4.0: CRITICAL
Last modification:
11/12/2025