Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-15366

Publication date:
20/01/2026
The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-15367

Publication date:
20/01/2026
The poplib module, when passed a user-controlled command, can have<br /> additional commands injected using newlines. Mitigation rejects commands<br /> containing control characters.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-11468

Publication date:
20/01/2026
When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2025-15282

Publication date:
20/01/2026
User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
Severity CVSS v4.0: MEDIUM
Last modification:
20/01/2026

CVE-2026-21664

Publication date:
20/01/2026
HackerOne community member Huynh Pham Thanh Luc (nigh7c0r3) has reported a reflected XSS vulnerability in the afr.php delivery script of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2026-21640

Publication date:
20/01/2026
HackerOne community member Faraz Ahmed (PakCyberbot) has reported a format string injection in the Revive Adserver settings. When specific character combinations are used in a setting, the admin user console could be disabled due to a fatal PHP error.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2026-21641

Publication date:
20/01/2026
HackerOne community member Jad Ghamloush (0xjad) has reported an authorization bypass vulnerability in the `tracker-delete.php` script of Revive Adserver. Users with permissions to delete trackers are mistakenly allowed to delete trackers owned by other accounts.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2026-21642

Publication date:
20/01/2026
HackerOne community member Patrick Lang (7yr) has reported a reflected XSS vulnerability in the `banner-acl.php` and `channel-acl.php` scripts of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2026-21663

Publication date:
20/01/2026
HackerOne community member Patrick Lang (7yr) has reported a reflected XSS vulnerability in the banner-acl.php script of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2026-21636

Publication date:
20/01/2026
A flaw in Node.js&amp;#39;s permission model allows Unix Domain Socket (UDS) connections to bypass network restrictions when `--permission` is enabled. Even without `--allow-net`, attacker-controlled inputs (such as URLs or socketPath options) can connect to arbitrary local sockets via net, tls, or undici/fetch. This breaks the intended security boundary of the permission model and enables access to privileged local services, potentially leading to privilege escalation, data exposure, or local code execution.<br /> <br /> * The issue affects users of the Node.js permission model on version v25.<br /> <br /> In the moment of this vulnerability, network permissions (`--allow-net`) are still in the experimental phase.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2026-21637

Publication date:
20/01/2026
A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026

CVE-2025-59465

Publication date:
20/01/2026
A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:<br /> ```<br /> server.on(&amp;#39;secureConnection&amp;#39;, socket =&gt; {<br /> socket.on(&amp;#39;error&amp;#39;, err =&gt; {<br /> console.log(err)<br /> })<br /> })<br /> ```
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2026