Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-25694

Publication date:
06/02/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2026-25695

Publication date:
06/02/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2026-25696

Publication date:
06/02/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2026-25697

Publication date:
06/02/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2026-25698

Publication date:
06/02/2026
Rejected reason: Not used
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2025-15566

Publication date:
06/02/2026
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2026-1975

Publication date:
06/02/2026
A security flaw has been discovered in Free5GC up to 4.1.0. This impacts the function identityTriggerType of the file pfcp_reports.go. The manipulation results in null pointer dereference. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Applying a patch is advised to resolve this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
06/02/2026

CVE-2026-1976

Publication date:
06/02/2026
A weakness has been identified in Free5GC up to 4.1.0. Affected is the function SessionDeletionResponse of the component SMF. This manipulation causes null pointer dereference. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. It is suggested to install a patch to address this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
06/02/2026

CVE-2026-1228

Publication date:
06/02/2026
The Timeline Block – Beautiful Timeline Builder for WordPress (Vertical & Horizontal Timelines) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.3 via the tlgb_shortcode() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to disclose private timeline content via the id attribute supplied to the 'timeline_block' shortcode.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2026

CVE-2026-1973

Publication date:
06/02/2026
A vulnerability was determined in Free5GC up to 4.1.0. The impacted element is the function establishPfcpSession of the component SMF. Executing a manipulation can lead to null pointer dereference. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. It is best practice to apply a patch to resolve this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
06/02/2026

CVE-2026-1974

Publication date:
06/02/2026
A vulnerability was identified in Free5GC up to 4.1.0. This affects the function ResolveNodeIdToIp of the file internal/sbi/processor/datapath.go of the component SMF. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. It is recommended to apply a patch to fix this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
06/02/2026

CVE-2026-1972

Publication date:
06/02/2026
A vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_check_userpass2. Performing a manipulation of the argument Username/Password results in use of default credentials. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.
Severity CVSS v4.0: MEDIUM
Last modification:
06/02/2026