Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-70091

Publication date:
13/02/2026
A cross-site scripting (XSS) vulnerability in the Customers function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Phone Number parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-70093

Publication date:
13/02/2026
An issue in OpenSourcePOS v3.4.1 allows attackers to execute arbitrary code via returning a crafted AJAX response.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-70094

Publication date:
13/02/2026
A cross-site scripting (XSS) vulnerability in the Generate Item Barcode function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Item Category parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-25531

Publication date:
13/02/2026
Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, The fix for CVE-2023-33968 is incomplete. The TaskCreationController::duplicateProjects() endpoint does not validate user permissions for target projects, allowing authenticated users to duplicate tasks into projects they cannot access. This vulnerability is fixed in 1.2.50.
Severity CVSS v4.0: Pending analysis
Last modification:
13/02/2026

CVE-2026-1578

Publication date:
13/02/2026
HP App for Android is potentially vulnerable to cross-site scripting (XSS) when using an outdated version of the application via mobile devices. HP is releasing updates to mitigate these potential vulnerabilities.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2026-1619

Publication date:
13/02/2026
Authorization Bypass Through User-Controlled Key vulnerability in Universal Software Inc. FlexCity/Kiosk allows Exploitation of Trusted Identifiers.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2026-23111

Publication date:
13/02/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()<br /> <br /> nft_map_catchall_activate() has an inverted element activity check<br /> compared to its non-catchall counterpart nft_mapelem_activate() and<br /> compared to what is logically required.<br /> <br /> nft_map_catchall_activate() is called from the abort path to re-activate<br /> catchall map elements that were deactivated during a failed transaction.<br /> It should skip elements that are already active (they don&amp;#39;t need<br /> re-activation) and process elements that are inactive (they need to be<br /> restored). Instead, the current code does the opposite: it skips inactive<br /> elements and processes active ones.<br /> <br /> Compare the non-catchall activate callback, which is correct:<br /> <br /> nft_mapelem_activate():<br /> if (nft_set_elem_active(ext, iter-&gt;genmask))<br /> return 0; /* skip active, process inactive */<br /> <br /> With the buggy catchall version:<br /> <br /> nft_map_catchall_activate():<br /> if (!nft_set_elem_active(ext, genmask))<br /> continue; /* skip inactive, process active */<br /> <br /> The consequence is that when a DELSET operation is aborted,<br /> nft_setelem_data_activate() is never called for the catchall element.<br /> For NFT_GOTO verdict elements, this means nft_data_hold() is never<br /> called to restore the chain-&gt;use reference count. Each abort cycle<br /> permanently decrements chain-&gt;use. Once chain-&gt;use reaches zero,<br /> DELCHAIN succeeds and frees the chain while catchall verdict elements<br /> still reference it, resulting in a use-after-free.<br /> <br /> This is exploitable for local privilege escalation from an unprivileged<br /> user via user namespaces + nftables on distributions that enable<br /> CONFIG_USER_NS and CONFIG_NF_TABLES.<br /> <br /> Fix by removing the negation so the check matches nft_mapelem_activate():<br /> skip active elements, process inactive ones.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2026-23112

Publication date:
13/02/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec<br /> <br /> nvmet_tcp_build_pdu_iovec() could walk past cmd-&gt;req.sg when a PDU<br /> length or offset exceeds sg_cnt and then use bogus sg-&gt;length/offset<br /> values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining<br /> entries, and sg-&gt;length/offset before building the bvec.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2025-14349

Publication date:
13/02/2026
Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2026-1618

Publication date:
13/02/2026
Authentication Bypass Using an Alternate Path or Channel vulnerability in Universal Software Inc. FlexCity/Kiosk allows Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2026-2443

Publication date:
13/02/2026
A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2026

CVE-2025-33042

Publication date:
13/02/2026
Improper Control of Generation of Code (&amp;#39;Code Injection&amp;#39;) vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas.<br /> <br /> This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0.<br /> <br /> Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2026