Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-0950

Publication date:
03/02/2026
The Spectra Gutenberg Blocks – Website Builder for the Block Editor plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.19.17. This is due to the plugin failing to check `post_password_required()` before rendering post excerpts in the `render_excerpt()` function and the `uagb_get_excerpt()` helper function. This makes it possible for unauthenticated attackers to read excerpts of password-protected posts by simply viewing any page that contains a Spectra Post Grid, Post Masonry, Post Carousel, or Post Timeline block.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-24694

Publication date:
03/02/2026
The installer for Roland Cloud Manager ver.3.1.19 and prior insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the application.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026

CVE-2025-9711

Publication date:
03/02/2026
A vulnerability in Brocade Fabric OS before 9.2.1c3 could allow elevating the privileges of the local authenticated user to “root” using the export option of seccertmgmt and seccryptocfg commands.
Severity CVSS v4.0: HIGH
Last modification:
06/02/2026

CVE-2025-14274

Publication date:
03/02/2026
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Border Hero widget's Button Link field in versions up to 2.0.1. This is due to insufficient input sanitization and output escaping on user-supplied URLs. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2025-58381

Publication date:
03/02/2026
A<br /> vulnerability in Brocade Fabric OS before 9.2.1c2 could allow an <br /> authenticated attacker with admin privileges using the shell commands <br /> “source, ping6, sleep, disown, wait to modify the path variables and <br /> move upwards in the directory structure or to traverse to different <br /> directories.
Severity CVSS v4.0: MEDIUM
Last modification:
06/02/2026

CVE-2025-58380

Publication date:
03/02/2026
A vulnerability in Brocade Fabric OS before 9.2.1 could allow an authenticated attacker with admin privileges using the shell command “grep” to modify the path variables and move upwards in the directory structure or to traverse to different directories.
Severity CVSS v4.0: MEDIUM
Last modification:
06/02/2026

CVE-2026-0909

Publication date:
03/02/2026
The WP ULike plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.8.3.1. This is due to the `wp_ulike_delete_history_api` AJAX action not verifying that the log entry being deleted belongs to the current user. This makes it possible for authenticated attackers, with Subscriber-level access and above (granted the &amp;#39;stats&amp;#39; capability is assigned to their role), to delete arbitrary log entries belonging to other users via the &amp;#39;id&amp;#39; parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-1788

Publication date:
03/02/2026
: Out-of-bounds Write vulnerability in Xquic Project Xquic Server xquic on Linux (QUIC protocol implementation, packet processing module modules) allows : Buffer Manipulation.This issue affects Xquic Server: through 1.8.3.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2026-24936

Publication date:
03/02/2026
When a specific function is enabled while joining a AD Domain from ADM, an improper input parameters validation vulnerability in a specific CGI program allowing an unauthenticated remote attacker to write arbitrary data to any file on the system. By exploiting this vulnerability, attackers can overwrite critical system files, leading to a complete system compromise.<br /> Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
Severity CVSS v4.0: CRITICAL
Last modification:
03/02/2026

CVE-2026-0383

Publication date:
03/02/2026
A vulnerability in Brocade Fabric OS could allow an authenticated, local attacker with privileges to access the Bash shell to access insecurely stored file contents including the history command.
Severity CVSS v4.0: HIGH
Last modification:
06/02/2026

CVE-2026-24932

Publication date:
03/02/2026
The DDNS update function in ADM fails to properly validate the hostname of the DDNS server&amp;#39;s TLS/SSL certificate. Although the connection uses HTTPS, an improper validated TLS/SSL certificates allows a remote attacker can intercept the communication to perform a Man-in-the-Middle (MitM) attack, which may obtain the sensitive information of DDNS updating process, including the user&amp;#39;s account email, MD5 hashed password, and device serial number.This issue affects ADM: from 4.1.0 through 4.3.3.ROF1, from 5.0.0 through 5.1.1.RCI1.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026

CVE-2026-24933

Publication date:
03/02/2026
The API communication component fails to validate the SSL/TLS certificate when sending HTTPS requests to the server. An improper certificates validation vulnerability allows an unauthenticated remote attacker can perform a Man-in-the-Middle (MitM) attack to intercept the cleartext communication, potentially leading to the exposure of sensitive user information, including account emails, MD5 hashed passwords, and device serial numbers.<br /> <br /> <br /> Affected products and versions include: from ADM 4.1.0 through ADM 4.3.3.ROF1 as well as from ADM 5.0.0 through ADM 5.1.1.RCI1.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026