Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-23416

Publication date:
02/04/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/mseal: update VMA end correctly on merge<br /> <br /> Previously we stored the end of the current VMA in curr_end, and then upon<br /> iterating to the next VMA updated curr_start to curr_end to advance to the<br /> next VMA.<br /> <br /> However, this doesn&amp;#39;t take into account the fact that a VMA might be<br /> updated due to a merge by vma_modify_flags(), which can result in curr_end<br /> being stale and thus, upon setting curr_start to curr_end, ending up with<br /> an incorrect curr_start on the next iteration.<br /> <br /> Resolve the issue by setting curr_end to vma-&gt;vm_end unconditionally to<br /> ensure this value remains updated should this occur.<br /> <br /> While we&amp;#39;re here, eliminate this entire class of bug by simply setting<br /> const curr_[start/end] to be clamped to the input range and VMAs, which<br /> also happens to simplify the logic.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-5326

Publication date:
02/04/2026
A vulnerability was identified in SourceCodester Leave Application System 1.0. Impacted is an unknown function of the file /index.php?page=manage_user of the component User Information Handler. Such manipulation of the argument ID leads to authorization bypass. The attack can be executed remotely. The exploit is publicly available and might be used.
Severity CVSS v4.0: MEDIUM
Last modification:
02/04/2026

CVE-2026-32145

Publication date:
02/04/2026
Allocation of Resources Without Limits or Throttling vulnerability in gleam-wisp wisp allows a denial of service via multipart form body parsing.<br /> <br /> The multipart_body function bypasses configured max_body_size and max_files_size limits. When a multipart boundary is not present in a chunk, the parser takes the MoreRequiredForBody path, which appends the chunk to the output but passes the quota unchanged to the recursive call. Only the final chunk containing the boundary is counted via decrement_quota. The same pattern exists in multipart_headers, where MoreRequiredForHeaders recurses without calling decrement_body_quota.<br /> <br /> An unauthenticated attacker can exhaust server memory or disk by sending arbitrarily large multipart form submissions in a single HTTP request.<br /> <br /> This issue affects wisp: from 0.2.0 before 2.2.2.
Severity CVSS v4.0: HIGH
Last modification:
02/04/2026

CVE-2026-33616

Publication date:
02/04/2026
An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability in the mb24api endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-33617

Publication date:
02/04/2026
An unauthenticated remote attacker can access a configuration file containing database credentials. This can result in a some loss of confidentiality, but there is no endpoint exposed to use these credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-5245

Publication date:
02/04/2026
A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the function handle_mdns_record of the file mongoose.c of the component mDNS Record Handler. Performing a manipulation of the argument buf results in stack-based buffer overflow. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been made public and could be used. Upgrading to version 7.21 will fix this issue. The patch is named 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Severity CVSS v4.0: MEDIUM
Last modification:
02/04/2026

CVE-2026-5246

Publication date:
02/04/2026
A vulnerability was determined in Cesanta Mongoose up to 7.20. Affected is the function mg_tls_verify_cert_signature of the file mongoose.c of the component P-384 Public Key Handler. Executing a manipulation can lead to authorization bypass. The attack can be executed remotely. Attacks of this nature are highly complex. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. Upgrading to version 7.21 is able to address this issue. This patch is called 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Severity CVSS v4.0: MEDIUM
Last modification:
02/04/2026

CVE-2026-33614

Publication date:
02/04/2026
An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the getinfo endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-33615

Publication date:
02/04/2026
An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the setinfo endpoint due to improper neutralization of special elements in a SQL UPDATE command. This can result in a total loss of integrity and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-33613

Publication date:
02/04/2026
Due to the improper neutralisation of special elements used in an OS command, a remote attacker can exploit an RCE vulnerability in the generateSrpArray function, resulting in full system compromise.<br /> This vulnerability can only be attacked if the attacker has some other way to write arbitrary data to the user table.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-29143

Publication date:
02/04/2026
SEPPmail Secure Email Gateway before version 15.0.3 does not properly authenticate the inner message of S/MIME-encrypted MIME entities, allowing an attacker to control trusted headers.
Severity CVSS v4.0: HIGH
Last modification:
02/04/2026

CVE-2026-29144

Publication date:
02/04/2026
SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass subject sanitization and forge security tags using Unicode lookalike characters.
Severity CVSS v4.0: HIGH
Last modification:
02/04/2026