Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-32204

Publication date:
12/05/2026
External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2026-32209

Publication date:
12/05/2026
Improper access control in Windows Filtering Platform (WFP) allows an authorized attacker to bypass a security feature locally.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026

CVE-2026-32185

Publication date:
12/05/2026
Files or directories accessible to external parties in Microsoft Teams allows an unauthorized attacker to perform spoofing locally.
Severity CVSS v4.0: Pending analysis
Last modification:
18/05/2026

CVE-2026-32175

Publication date:
12/05/2026
A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories.<br /> To exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.<br /> The security update fixes the vulnerability by ensuring .NET Core properly handles files.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2026-32177

Publication date:
12/05/2026
Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2026-32170

Publication date:
12/05/2026
Double free in Windows Rich Text Edit Control allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026

CVE-2026-32161

Publication date:
12/05/2026
Concurrent execution using shared resource with improper synchronization (&amp;#39;race condition&amp;#39;) in Windows Native WiFi Miniport Driver allows an unauthorized attacker to execute code over an adjacent network.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026

CVE-2026-31245

Publication date:
12/05/2026
The mem0 1.0.0 server lacks authentication and authorization controls for its memory creation API endpoint (POST /memories). The endpoint allows unauthenticated users to submit arbitrary memory records without verifying their identity or permissions. A remote attacker can exploit this by sending unauthenticated POST requests to create malicious or spoofed memory entries in the database, leading to unauthorized data injection and potential data pollution.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026

CVE-2026-31241

Publication date:
12/05/2026
The mem0 1.0.0 server lacks authentication and authorization controls for its memory deletion API endpoint (DELETE /memories). The endpoint allows unauthenticated users to delete memory records by specifying arbitrary user identifiers (e.g., user_id, run_id, agent_id) in the request query parameters. A remote attacker can exploit this by sending unauthenticated DELETE requests to erase memory data for any user, leading to unauthorized data loss and denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026

CVE-2026-31242

Publication date:
12/05/2026
The mem0 v1.0.0 server lacks authentication and authorization controls for its memory reset functionality accessible via the DELETE /memories endpoint. An unauthenticated attacker can send a DELETE request that triggers a reset operation, leading to the execution of a DROP TABLE SQL statement. This results in the deletion of the entire memory database table, causing catastrophic data loss and a complete denial of service for all users of the service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026

CVE-2026-31243

Publication date:
12/05/2026
The mem0 1.0.0 server lacks authentication and authorization controls for its memory reset and table re-creation functionality accessible via the DELETE /memories endpoint. An unauthenticated attacker can send a DELETE request that triggers a reset operation, leading to the execution of a CREATE TABLE SQL statement. This can cause unexpected table re-creation, schema disruption, potential data loss, and denial of service for the memory management service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026

CVE-2026-31244

Publication date:
12/05/2026
The mem0 1.0.0 server lacks authentication and authorization controls for its memory deletion API endpoint (DELETE /memories/{memory_id}). The endpoint allows unauthenticated users to delete arbitrary memory records without verifying their identity or permissions. A remote attacker can exploit this by sending unauthenticated DELETE requests to remove any memory entry from the database, leading to unauthorized data loss and potential denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2026