Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-65112

Publication date:
29/11/2025
PubNet is a self-hosted Dart & Flutter package service. Prior to version 1.1.3, the /api/storage/upload endpoint in PubNet allows unauthenticated users to upload packages as any user by providing arbitrary author-id values. This enables identity spoofing, privilege escalation, and supply chain attacks. This issue has been patched in version 1.1.3.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2025

CVE-2025-66027

Publication date:
29/11/2025
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.
Severity CVSS v4.0: HIGH
Last modification:
03/12/2025

CVE-2025-64715

Publication date:
29/11/2025
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.16.17, 1.17.10, and 1.18.4, CiliumNetworkPolicys which use egress.toGroups.aws.securityGroupsIds to reference AWS security group IDs that do not exist or are not attached to any network interface may unintentionally allow broader outbound access than intended by the policy authors. In such cases, the toCIDRset section of the derived policy is not generated, which means outbound traffic may be permitted to more destinations than originally intended. This issue has been patched in versions 1.16.17, 1.17.10, and 1.18.4. There are no workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-13683

Publication date:
28/11/2025
Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-12183

Publication date:
28/11/2025
Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-59792

Publication date:
28/11/2025
Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks.<br /> <br /> This issue affects Apache Kvrocks: from 1.0.0 through 2.13.0.<br /> <br /> Users are recommended to upgrade to version 2.14.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-59790

Publication date:
28/11/2025
Improper Privilege Management vulnerability in Apache Kvrocks.<br /> <br /> This issue affects Apache Kvrocks: from v2.9.0 through v2.13.0.<br /> <br /> Users are recommended to upgrade to version 2.14.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
04/12/2025

CVE-2025-51733

Publication date:
28/11/2025
Cross-Site Request Forgery (CSRF) vulnerability in HCL Technologies Ltd. Unica 12.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2025

CVE-2025-51734

Publication date:
28/11/2025
Cross-site scripting (XSS) vulnerability in HCL Technologies Ltd. Unica 12.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2025

CVE-2025-51735

Publication date:
28/11/2025
CSV formula injection vulnerability in HCL Technologies Ltd. Unica 12.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2025

CVE-2025-51736

Publication date:
28/11/2025
File upload vulnerability in HCL Technologies Ltd. Unica 12.0.0.
Severity CVSS v4.0: Pending analysis
Last modification:
02/12/2025

CVE-2025-12638

Publication date:
28/11/2025
Keras version 3.11.3 is affected by a path traversal vulnerability in the keras.utils.get_file() function when extracting tar archives. The vulnerability arises because the function uses Python&amp;#39;s tarfile.extractall() method without the security-critical filter=&amp;#39;data&amp;#39; parameter. Although Keras attempts to filter unsafe paths using filter_safe_paths(), this filtering occurs before extraction, and a PATH_MAX symlink resolution bug triggers during extraction. This bug causes symlink resolution to fail due to path length limits, resulting in a security bypass that allows files to be written outside the intended extraction directory. This can lead to arbitrary file writes outside the cache directory, enabling potential system compromise or malicious code execution. The vulnerability affects Keras installations that process tar archives with get_file() and does not affect versions where this extraction method is secured with the appropriate filter parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026