Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-59390

Publication date:
26/11/2025
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`,<br /> which is not a crypto-graphically secure random number generator. This <br /> may allow an attacker to predict or brute force the secret used to sign <br /> authentication cookies, potentially enabling token forgery or <br /> authentication bypass. Additionally, each process generates its own <br /> fallback secret, resulting in inconsistent secrets across nodes. This <br /> causes authentication failures in distributed or multi-broker <br /> deployments, effectively leading to a incorrectly configured clusters. Users are <br /> advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret`<br /> <br /> <br /> <br /> This issue affects Apache Druid: through 34.0.0.<br /> <br /> Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-62728

Publication date:
26/11/2025
SQL injection vulnerability in Hive Metastore Server (HMS) when processing delete column statistics requests via the Thrift APIs. The vulnerability is only exploitable by trusted/authorized users/applications that are allowed to call directly the Thrift APIs. In most real-world deployments, HMS is accessible to only a handful of applications (e.g., Hiveserver2) thus the vulnerability is not exploitable. Moreover, the vulnerable code cannot be reached when metastore.try.direct.sql property is set to false.<br /> <br /> This issue affects Apache Hive: from 4.1.0 before 4.2.0.<br /> <br /> Users are recommended to upgrade to version 4.2.0, which fixes the issue. Users who cannot upgrade directly are encouraged to set metastore.try.direct.sql property to false if the HMS Thrift APIs are exposed to general public.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-13735

Publication date:
26/11/2025
Out-of-bounds Read vulnerability in ASR1903、ASR3901 in ASR Lapwing_Linux on Linux (nr_fw modules). This vulnerability is associated with program files Code/nr_fw/DLP/src/NrCgi.C.<br /> <br /> This issue affects Lapwing_Linux: before 2025/11/26.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2025

CVE-2025-9557

Publication date:
26/11/2025
‭An out-of-bound write can lead to an arbitrary code execution. Even on devices with some form of memory protection, this can still lead to‬ ‭a crash and a resultant denial of service.‬
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2025

CVE-2025-9558

Publication date:
26/11/2025
There is a potential OOB Write vulnerability in the gen_prov_start function in pb_adv.c. The full length of the received data is copied into the link.rx.buf receiver buffer without any validation on the data size.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2025

CVE-2025-59820

Publication date:
26/11/2025
In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2025

CVE-2025-12061

Publication date:
26/11/2025
The TAX SERVICE Electronic HDM WordPress plugin before 1.2.1 does not authorization and CSRF checks in an AJAX action, allowing unauthenticated users to import and execute arbitrary SQL statements
Severity CVSS v4.0: Pending analysis
Last modification:
09/01/2026

CVE-2025-55174

Publication date:
26/11/2025
In KDE Skanpage before 25.08.0, an attempt at file overwrite can result in the contents of the new file at the beginning followed by the partial contents of the old file at the end, because of use of QIODevice::ReadWrite instead of QODevice::WriteOnly.
Severity CVSS v4.0: Pending analysis
Last modification:
01/12/2025

CVE-2025-64983

Publication date:
26/11/2025
Smart Video Doorbell firmware versions prior to 2.01.078 contain an active debug code vulnerability that allows an attacker to connect via Telnet and gain access to the device.
Severity CVSS v4.0: HIGH
Last modification:
01/12/2025

CVE-2025-66229

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66230

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-66231

Publication date:
26/11/2025
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025