Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2018-25203

Publication date:
26/03/2026
Online Store System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to index.php with the action=clientaccess parameter using boolean-based blind or time-based blind SQL injection payloads in the email field to extract sensitive database information.
Severity CVSS v4.0: HIGH
Last modification:
01/05/2026

CVE-2018-25207

Publication date:
26/03/2026
Online Quiz Maker 1.0 contains SQL injection vulnerabilities in the catid and usern parameters that allow authenticated attackers to execute arbitrary SQL commands. Attackers can submit malicious POST requests to quiz-system.php or add-category.php with crafted SQL payloads in POST parameters to extract sensitive database information or bypass authentication.
Severity CVSS v4.0: HIGH
Last modification:
01/05/2026

CVE-2018-25206

Publication date:
26/03/2026
KomSeo Cart 1.3 contains an SQL injection vulnerability that allows attackers to inject SQL commands through the 'my_item_search' parameter in edit.php. Attackers can submit POST requests with malicious SQL payloads to extract sensitive database information using boolean-based blind or error-based injection techniques.
Severity CVSS v4.0: HIGH
Last modification:
01/05/2026

CVE-2018-25185

Publication date:
26/03/2026
Wecodex Restaurant CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the username parameter. Attackers can send POST requests to the login endpoint with malicious SQL payloads using boolean-based blind or time-based blind techniques to extract sensitive database information.
Severity CVSS v4.0: HIGH
Last modification:
27/03/2026

CVE-2018-25195

Publication date:
26/03/2026
Wecodex Hotel CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows unauthenticated attackers to bypass authentication by injecting SQL code. Attackers can submit malicious SQL payloads through the username parameter in POST requests to index.php with action=processlogin to extract sensitive database information or gain unauthorized administrative access.
Severity CVSS v4.0: HIGH
Last modification:
27/03/2026

CVE-2018-25201

Publication date:
26/03/2026
School Management System CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious payloads using boolean-based blind SQL injection techniques to the processlogin endpoint to authenticate as administrator without valid credentials.
Severity CVSS v4.0: HIGH
Last modification:
27/03/2026

CVE-2018-25202

Publication date:
26/03/2026
SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the 'id' parameter in the signIn endpoint. Attackers can submit POST requests with boolean-based blind, stacked queries, or time-based blind SQL injection payloads to extract sensitive data or compromise the application.
Severity CVSS v4.0: HIGH
Last modification:
26/03/2026

CVE-2018-25183

Publication date:
26/03/2026
Shipping System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious SQL payloads using boolean-based blind techniques in POST requests to the admin login endpoint to authenticate without valid credentials.
Severity CVSS v4.0: HIGH
Last modification:
27/03/2026

CVE-2026-4274

Publication date:
26/03/2026
Mattermost versions 11.2.x
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-4809

Publication date:
26/03/2026
plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can submit a file containing executable PHP code while declaring a benign image MIME type, resulting in arbitrary file upload. If the uploaded file is stored in a web-accessible and executable location, this may lead to remote code execution. At the time of publication, no patch was available and the vendor had not responded to coordinated disclosure attempts.
Severity CVSS v4.0: CRITICAL
Last modification:
19/05/2026

CVE-2026-24068

Publication date:
26/03/2026
The VSL privileged helper does utilize NSXPC for IPC. The implementation of the "shouldAcceptNewConnection" function, which is used by the NSXPC framework to validate if a client should be allowed to connect to the XPC listener, does not validate clients at all. This means that any process can connect to this service using the configured protocol. A malicious process is able to call all the functions defined in the corresponding HelperToolProtocol. No validation is performed in the functions "writeReceiptFile" and “runUninstaller” of the HelperToolProtocol. This allows an attacker to write files to any location with any data as well as execute any file with any arguments. Any process can call these functions because of the missing XPC client validation described before. The abuse of the missing endpoint validation leads to privilege escalation.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-23398

Publication date:
26/03/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> icmp: fix NULL pointer dereference in icmp_tag_validation()<br /> <br /> icmp_tag_validation() unconditionally dereferences the result of<br /> rcu_dereference(inet_protos[proto]) without checking for NULL.<br /> The inet_protos[] array is sparse -- only about 15 of 256 protocol<br /> numbers have registered handlers. When ip_no_pmtu_disc is set to 3<br /> (hardened PMTU mode) and the kernel receives an ICMP Fragmentation<br /> Needed error with a quoted inner IP header containing an unregistered<br /> protocol number, the NULL dereference causes a kernel panic in<br /> softirq context.<br /> <br /> Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI<br /> KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]<br /> RIP: 0010:icmp_unreach (net/ipv4/icmp.c:1085 net/ipv4/icmp.c:1143)<br /> Call Trace:<br /> <br /> icmp_rcv (net/ipv4/icmp.c:1527)<br /> ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207)<br /> ip_local_deliver_finish (net/ipv4/ip_input.c:242)<br /> ip_local_deliver (net/ipv4/ip_input.c:262)<br /> ip_rcv (net/ipv4/ip_input.c:573)<br /> __netif_receive_skb_one_core (net/core/dev.c:6164)<br /> process_backlog (net/core/dev.c:6628)<br /> handle_softirqs (kernel/softirq.c:561)<br /> <br /> <br /> Add a NULL check before accessing icmp_strict_tag_validation. If the<br /> protocol has no registered handler, return false since it cannot<br /> perform strict tag validation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026