Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-22914

Publication date:
15/01/2026
An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22915

Publication date:
15/01/2026
An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22916

Publication date:
15/01/2026
An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22917

Publication date:
15/01/2026
Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22918

Publication date:
15/01/2026
An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web pages, leading to the extraction of sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22919

Publication date:
15/01/2026
An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, leading to the extraction of sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22637

Publication date:
15/01/2026
The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability. A user with Editor permissions is able to modify such a panel in order to make it execute arbitrary JavaScript.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22907

Publication date:
15/01/2026
An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22908

Publication date:
15/01/2026
Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22909

Publication date:
15/01/2026
Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22910

Publication date:
15/01/2026
The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026

CVE-2026-22911

Publication date:
15/01/2026
Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.
Severity CVSS v4.0: Pending analysis
Last modification:
15/01/2026