Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-43513

Publication date:
12/05/2026
Improper Handling of Case Sensitivity vulnerability in LockOutRealm in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.<br /> Older unsupported versions may also be affected.<br /> <br /> Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-43514

Publication date:
12/05/2026
Observable Timing Discrepancy vulnerability when comparing AJP secret in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.<br /> Older unsupported versions may also be affected.<br /> <br /> Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-43515

Publication date:
12/05/2026
Improper Authorization vulnerability when multiple method constraints define an HTTP method for the same extension in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.<br /> <br /> Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-41293

Publication date:
12/05/2026
Improper Input Validation vulnerability in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 10.0.0-M1 through 10.0.27.<br /> Older, end of support versions may also be affected.<br /> <br /> Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-42498

Publication date:
12/05/2026
Exposure of HTTP Authentication Header to unexpected hosts during WebSocket authentication vulnerability in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.2 through 9.0.117, from 8.5.24 through 8.5.100, from 7.0.83 through 7.0.109.<br /> <br /> Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118, which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-43512

Publication date:
12/05/2026
DEPRECATED: Authentication Bypass Issues vulnerability in digest authentication in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from before 7.0.0.<br /> Older unsupported versions any also be affect<br /> <br /> Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-41284

Publication date:
12/05/2026
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117.<br /> Older, unsupported versions may also be affected.<br /> <br /> Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-31225

Publication date:
12/05/2026
The superduper project thru v0.10.0 contains a critical remote code execution vulnerability in its query parsing component. The _parse_op_part() function in query.py uses the unsafe eval() function to dynamically evaluate user-supplied query operands without proper sanitization or restriction. Although the function attempts to limit the execution context by providing a restricted global namespace, it does not block access to dangerous built-in functions. A remote attacker can exploit this by submitting a specially crafted query string containing Python code that imports modules (e.g., os) and executes arbitrary system commands, leading to complete compromise of the server.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-31226

Publication date:
12/05/2026
The TinyZero project thru commit 6652a63c57fa7e5ccde3fc9c598c7176ff15b839 (2025-58-24) contains a critical command injection vulnerability (CWE-78) in its HDFS file operation utilities. The vulnerability arises from the unsafe construction and execution of shell commands via os.system() without proper input sanitization or escaping. User-controlled input (such as file paths) is directly interpolated into shell command strings using f-strings within the _copy() function. An attacker can inject arbitrary OS commands by supplying a specially crafted path parameter through the Hydra configuration framework. This leads to remote code execution with the privileges of the user running the TinyZero training process.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-31228

Publication date:
12/05/2026
The Adversarial Robustness Toolbox (ART) thru 1.20.1 contains a remote code execution vulnerability in its Kubeflow component. The robustness evaluation function for PyTorch models uses the unsafe eval() function to dynamically evaluate user-supplied strings for the LossFn and Optimizer parameters without any sanitization or security restrictions. An attacker can exploit this by providing a specially crafted string that contains arbitrary Python code, which will be executed when eval() is called, leading to complete compromise of the system running the ART evaluation.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-31221

Publication date:
12/05/2026
PyTorch-Lightning versions 2.6.0 and earlier contain an insecure deserialization vulnerability (CWE-502) in the checkpoint loading mechanism. The LightningModule.load_from_checkpoint() method, which is commonly used to load saved model states, internally calls torch.load() without setting the security-restrictive weights_only=True parameter. This default behavior allows the deserialization of arbitrary Python objects via the Pickle module. A remote attacker can exploit this by providing a maliciously crafted checkpoint file, leading to arbitrary code execution on the victim&amp;#39;s system when the file is loaded.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-31222

Publication date:
12/05/2026
The snorkel library thru v0.10.0 contains an insecure deserialization vulnerability (CWE-502) in the Trainer.load() method of the Trainer class. The method loads model checkpoint files using torch.load() without enabling the security-restrictive weights_only=True parameter. This default behavior allows the deserialization of arbitrary Python objects via the Pickle module. A remote attacker can exploit this by providing a maliciously crafted model file, leading to arbitrary code execution on the victim&amp;#39;s system when the file is loaded via the vulnerable method.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026