Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-23665

Publication date:
10/03/2026
Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2026

CVE-2026-23239

Publication date:
10/03/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> espintcp: Fix race condition in espintcp_close()<br /> <br /> This issue was discovered during a code audit.<br /> <br /> After cancel_work_sync() is called from espintcp_close(),<br /> espintcp_tx_work() can still be scheduled from paths such as<br /> the Delayed ACK handler or ksoftirqd.<br /> As a result, the espintcp_tx_work() worker may dereference a<br /> freed espintcp ctx or sk.<br /> <br /> The following is a simple race scenario:<br /> <br /> cpu0 cpu1<br /> <br /> espintcp_close()<br /> cancel_work_sync(&amp;ctx-&gt;work);<br /> espintcp_write_space()<br /> schedule_work(&amp;ctx-&gt;work);<br /> <br /> To prevent this race condition, cancel_work_sync() is<br /> replaced with disable_work_sync().
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-23240

Publication date:
10/03/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: Fix race condition in tls_sw_cancel_work_tx()<br /> <br /> This issue was discovered during a code audit.<br /> <br /> After cancel_delayed_work_sync() is called from tls_sk_proto_close(),<br /> tx_work_handler() can still be scheduled from paths such as the<br /> Delayed ACK handler or ksoftirqd.<br /> As a result, the tx_work_handler() worker may dereference a freed<br /> TLS object.<br /> <br /> The following is a simple race scenario:<br /> <br /> cpu0 cpu1<br /> <br /> tls_sk_proto_close()<br /> tls_sw_cancel_work_tx()<br /> tls_write_space()<br /> tls_sw_write_space()<br /> if (!test_and_set_bit(BIT_TX_SCHEDULED, &amp;tx_ctx-&gt;tx_bitmask))<br /> set_bit(BIT_TX_SCHEDULED, &amp;ctx-&gt;tx_bitmask);<br /> cancel_delayed_work_sync(&amp;ctx-&gt;tx_work.work);<br /> schedule_delayed_work(&amp;tx_ctx-&gt;tx_work.work, 0);<br /> <br /> To prevent this race condition, cancel_delayed_work_sync() is<br /> replaced with disable_delayed_work_sync().
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-23656

Publication date:
10/03/2026
Insufficient verification of data authenticity in Windows App Installer allows an unauthorized attacker to perform spoofing over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/03/2026

CVE-2026-23654

Publication date:
10/03/2026
Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to execute code over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2026

CVE-2026-22628

Publication date:
10/03/2026
An improper access control vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an authenticated admin to execute system commands via a specifically crafted SSH config file.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2026

CVE-2026-22627

Publication date:
10/03/2026
A buffer copy without checking size of input (&amp;#39;classic buffer overflow&amp;#39;) vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2026

CVE-2026-22614

Publication date:
10/03/2026
The encryption mechanism used in Eaton&amp;#39;s EasySoft project file was insecure and susceptible to brute force attacks, an attacker with access to this file and the local host<br /> machine could potentially read the sensitive information stored and tamper with the project file. This security issue has been fixed in the latest version of Eaton EasySoft which is available on the Eaton download centre.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2026

CVE-2026-22629

Publication date:
10/03/2026
An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all versions, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4 all versions, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions, FortiManager Cloud 6.4 all versions may allow an attacker to bypass bruteforce protections via exploitation of race conditions. The latter raises the complexity of practical exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2026

CVE-2026-22572

Publication date:
10/03/2026
An authentication bypass using an alternate path or channel vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.2 through 7.2.11, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.2 through 7.2.11 may allow an attacker with knowledge of the admins password to bypass multifactor authentication checks via submitting multiple crafted requests.
Severity CVSS v4.0: Pending analysis
Last modification:
16/03/2026

CVE-2026-21262

Publication date:
10/03/2026
Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2026

CVE-2026-21791

Publication date:
10/03/2026
HCL Sametime for Android is impacted by a sensitive information disclosure. Hostnames information is written in application logs and certain URL
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026