Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-40283

Publication date:
17/04/2026
WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the "Nome" field in the "Informações Pacientes" page. The payload is stored and executed when the patient information is viewed. Version 3.6.10 fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2026

CVE-2026-40066

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unverified update packages that can be uploaded. The <br /> device unpacks and executes a script resulting in unauthenticated remote<br /> code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-35682

Publication date:
17/04/2026
Anviz CX2 Lite is vulnerable to an authenticated command injection via a <br /> filename parameter that enables arbitrary command execution (e.g., <br /> starting telnetd), resulting in root‑level access.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-35546

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted <br /> archives to be accepted, enabling attackers to plant and execute code <br /> and obtain a reverse shell.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-35061

Publication date:
17/04/2026
Anviz CX7 Firmware is vulnerable to the most recently captured test photo that can be <br /> retrieved without authentication, revealing sensitive operational <br /> imagery.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-33516

Publication date:
17/04/2026
xrdp is an open source RDP server. Versions through 0.10.5 contain an out-of-bounds read vulnerability during the RDP capability exchange phase. The issue occurs when memory is accessed before validating the remaining buffer length. A remote, unauthenticated attacker can trigger this vulnerability by sending a specially crafted Confirm Active PDU. Successful exploitation could lead to a denial of service (process crash) or potential disclosure of sensitive information from the process memory. This issue has been fixed in version 0.10.6.
Severity CVSS v4.0: HIGH
Last modification:
27/04/2026

CVE-2026-32624

Publication date:
17/04/2026
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
Severity CVSS v4.0: MEDIUM
Last modification:
27/04/2026

CVE-2026-34232

Publication date:
17/04/2026
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the xdr_status_vector() function does not handle the isc_arg_cstring type when decoding an op_response packet, causing a server crash when one is encountered in the status vector. An unauthenticated attacker can exploit this by sending a crafted op_response packet to the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2026

CVE-2026-33569

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling <br /> on‑path attackers to sniff credentials and session data, which can be <br /> used to compromise the device.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-33093

Publication date:
17/04/2026
Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device that captures<br /> a photo with the front facing camera, exposing visual information about<br /> the deployment environment.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-32648

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that discloses debug <br /> configuration details (e.g., SSH/RTTY status), assisting attackers in <br /> reconnaissance against the device.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-32650

Publication date:
17/04/2026
Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable <br /> encryption, causing database credentials to be sent in plaintext and <br /> enabling unauthorized database access.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026