Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-46174

Publication date:
26/11/2025
Ruoyi v4.8.0 vulnerable to Incorrect Access Control. There is a missing checkUserDataScope permission check in the resetPwd Method of SysUserController.java.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-50399

Publication date:
26/11/2025
FAST FAC1200R F400_FAC1200R_Q is vulnerable to Buffer Overflow in the function sub_80435780 via the parameter password.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-13601

Publication date:
26/11/2025
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-9163

Publication date:
26/11/2025
The Houzez theme for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.1.6 due to insufficient input sanitization and output escaping in the houzez_property_img_upload() and houzez_property_attachment_upload() functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-9191

Publication date:
26/11/2025
The Houzez theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.1.6 via deserialization of untrusted input in saved-search-item.php. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-13674

Publication date:
26/11/2025
BPv7 dissector crash in Wireshark 4.6.0 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-59390

Publication date:
26/11/2025
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`,<br /> which is not a crypto-graphically secure random number generator. This <br /> may allow an attacker to predict or brute force the secret used to sign <br /> authentication cookies, potentially enabling token forgery or <br /> authentication bypass. Additionally, each process generates its own <br /> fallback secret, resulting in inconsistent secrets across nodes. This <br /> causes authentication failures in distributed or multi-broker <br /> deployments, effectively leading to a incorrectly configured clusters. Users are <br /> advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret`<br /> <br /> <br /> <br /> This issue affects Apache Druid: through 34.0.0.<br /> <br /> Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-62728

Publication date:
26/11/2025
SQL injection vulnerability in Hive Metastore Server (HMS) when processing delete column statistics requests via the Thrift APIs. The vulnerability is only exploitable by trusted/authorized users/applications that are allowed to call directly the Thrift APIs. In most real-world deployments, HMS is accessible to only a handful of applications (e.g., Hiveserver2) thus the vulnerability is not exploitable. Moreover, the vulnerable code cannot be reached when metastore.try.direct.sql property is set to false.<br /> <br /> This issue affects Apache Hive: from 4.1.0 before 4.2.0.<br /> <br /> Users are recommended to upgrade to version 4.2.0, which fixes the issue. Users who cannot upgrade directly are encouraged to set metastore.try.direct.sql property to false if the HMS Thrift APIs are exposed to general public.
Severity CVSS v4.0: Pending analysis
Last modification:
27/11/2025

CVE-2025-13735

Publication date:
26/11/2025
Out-of-bounds Read vulnerability in ASR1903、ASR3901 in ASR Lapwing_Linux on Linux (nr_fw modules). This vulnerability is associated with program files Code/nr_fw/DLP/src/NrCgi.C.<br /> <br /> This issue affects Lapwing_Linux: before 2025/11/26.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-9557

Publication date:
26/11/2025
‭An out-of-bound write can lead to an arbitrary code execution. Even on devices with some form of memory protection, this can still lead to‬ ‭a crash and a resultant denial of service.‬
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-9558

Publication date:
26/11/2025
There is a potential OOB Write vulnerability in the gen_prov_start function in pb_adv.c. The full length of the received data is copied into the link.rx.buf receiver buffer without any validation on the data size.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025

CVE-2025-59820

Publication date:
26/11/2025
In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2025