Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-6023

Publication date:
22/04/2026
In Progress® Telerik® UI for AJAX versions 2024.4.1114 through 2026.1.421, the RadFilter control is vulnerable to insecure deserialization when restoring filter state if the state is exposed to the client. If an attacker tampers with this state, a server-side remote code execution is possible.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-6842

Publication date:
22/04/2026
A flaw was found in nano. In environments with permissive umask settings, a local attacker can exploit incorrect directory permissions (0777 instead of 0700) for the `~/.local` directory. This allows the attacker to inject a malicious `.desktop` launcher, which could lead to unintended actions or information disclosure if the launcher is subsequently processed.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-40542

Publication date:
22/04/2026
Missing critical step in authentication in Apache HttpClient 5.6 allows an attacker to cause the client to accept SCRAM-SHA-256 authentication without proper mutual authentication verification. Users are recommended to upgrade to version 5.6.1, which fixes this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-6022

Publication date:
22/04/2026
In Progress® Telerik® UI for AJAX prior to 2026.1.421, RadAsyncUpload contains an uncontrolled resource consumption vulnerability that allows file uploads to exceed the configured maximum size due to missing cumulative size enforcement during chunk reassembly, leading to disk space exhaustion.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-6840

Publication date:
22/04/2026
Missing bounds validation for operator could allow out of range operator-code lookup during model loading<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-6839

Publication date:
22/04/2026
Improper validation of STRING tensor offsets could allows malformed string metadata to trigger out of bounds access during constant tensor import in Samsung Open Source ONE<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-40449

Publication date:
22/04/2026
Integer overflow in buffer size calculation could result in out of bounds memory access when handling large tensors in Samsung Open Source ONE.<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-40450

Publication date:
22/04/2026
Integer overflow in output tensor copy size calculation in Samsung Open Source ONE could cause incorrect copy length and memory corruption for oversized tensors.<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-41664

Publication date:
22/04/2026
Integer overflow in memory copy size calculation in Samsung Open Source ONE could lead to invalid memory operations with large tensor shapes.<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-41665

Publication date:
22/04/2026
Integer overflow in scratch buffer initialization size calculation in Samsung Open Source ONE cause incorrect memory initialization for large intermediate tensors.<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-41666

Publication date:
22/04/2026
Integer overflow in tensor copy size calculation in Samsung Open Source ONE could lead to out of bounds access during loop state propagation.<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026

CVE-2026-41667

Publication date:
22/04/2026
Integer overflow in constant tensor data size calculation in Samsung Open Source ONE could cause incorrect buffer sizing for large constant nodes.<br /> Affected version is prior to commit 1.30.0.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2026