Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-7737

Publication date:
04/05/2026
A vulnerability was identified in osrg GoBGP up to 4.3.0. Affected by this issue is the function BMPPeerUpNotification.ParseBody/BMPStatisticsReport.ParseBody of the file pkg/packet/bmp/bmp.go of the component BMP Parser. The manipulation leads to out-of-bounds read. The attack can be initiated remotely. Upgrading to version 4.4.0 can resolve this issue. The identifier of the patch is bc77597d42335c78464bc8e15a471d887bbdf260. Upgrading the affected component is recommended.
Severity CVSS v4.0: MEDIUM
Last modification:
06/05/2026

CVE-2026-43859

Publication date:
04/05/2026
mutt before 2.3.2 sometimes uses strfcpy instead of memcpy for the IMAP auth_cram MD5 digest.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-43860

Publication date:
04/05/2026
mutt before 2.3.2 sometimes truncates the hash_passwd by one byte for IMAP auth_cram MD5 digest.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-43861

Publication date:
04/05/2026
mutt before 2.3.2 does not check for '\0' in url_pct_decode.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-43862

Publication date:
04/05/2026
In mutt before 2.3.2, the imap_auth_gss security level is mishandled.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-29200

Publication date:
04/05/2026
A critical IDOR vulnerability has been discovered in Comet Backup affecting all versions from 20.11.0 to 26.1.1 and 26.2.1. The vulnerability allows a tenant administrator to impersonate any end-user account of other tenants on the same server via a vulnerable API call.
Severity CVSS v4.0: CRITICAL
Last modification:
06/05/2026

CVE-2026-20451

Publication date:
04/05/2026
In slbc, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10828685; Issue ID: MSV-6504.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-20450

Publication date:
04/05/2026
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01753620; Issue ID: MSV-6100.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-20449

Publication date:
04/05/2026
In Modem, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01760138; Issue ID: MSV-6148.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-20448

Publication date:
04/05/2026
In geniezone, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10708513; Issue ID: MSV-6281.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-29199

Publication date:
04/05/2026
phpBB before 3.3.16 is vulnerable to Host Header Injection that can lead to password rest link poisoning. When force_server_vars is disabled, the servers hostname may be extracted from the HTTP Host header which is used to generate the password reset link URL. An attacker who can manipulate the Host header (e.g. through misconfigured host setup or missing header validation by the webserver) can cause password reset emails to contain a link pointing to an attacker-controlled domain, potentially leading to account takeover.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-20447

Publication date:
04/05/2026
In geniezone, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10724073; Issue ID: MSV-6296.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026