Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-26732

Publication date:
17/02/2026
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-26736

Publication date:
17/02/2026
TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-24733

Publication date:
17/02/2026
Improper Input Validation vulnerability in Apache Tomcat.<br /> <br /> <br /> Tomcat did not limit HTTP/0.9 requests to the GET method. If a security <br /> constraint was configured to allow HEAD requests to a URI but deny GET <br /> requests, the user could bypass that constraint on GET requests by <br /> sending a (specification invalid) HEAD request using HTTP/0.9.<br /> <br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.<br /> <br /> <br /> Older, EOL versions are also affected.<br /> <br /> Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-24734

Publication date:
17/02/2026
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.<br /> <br /> When using an OCSP responder, Tomcat Native (and Tomcat&amp;#39;s FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.<br /> <br /> This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.<br /> <br /> <br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.<br /> <br /> Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.<br /> <br /> Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-66614

Publication date:
17/02/2026
Improper Input Validation vulnerability.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.<br /> <br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.<br /> Tomcat did not validate that the host name provided via the SNI <br /> extension was the same as the host name provided in the HTTP host header <br /> field. If Tomcat was configured with more than one virtual host and the <br /> TLS configuration for one of those hosts did not require client <br /> certificate authentication but another one did, it was possible for a <br /> client to bypass the client certificate authentication by sending <br /> different host names in the SNI extension and the HTTP host header field.<br /> <br /> <br /> <br /> The vulnerability only applies if client certificate authentication is <br /> only enforced at the Connector. It does not apply if client certificate <br /> authentication is enforced at the web application.<br /> <br /> <br /> Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-12755

Publication date:
17/02/2026
IBM MQ Operator (SC2 v3.2.0–3.8.1, LTS v2.0.0–2.0.29) and IBM‑supplied MQ Advanced container images (across affected SC2, CD, and LTS 9.3.x–9.4.x releases) contain a vulnerability where log messages are not properly neutralized before being written to log files. This flaw could allow an unauthorized user to inject malicious data into MQ log entries, potentially leading to misleading logs, log manipulation, or downstream log‑processing issues.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-36018

Publication date:
17/02/2026
IBM Concert 1.0.0 through 2.1.0 for Z hub component is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-36019

Publication date:
17/02/2026
IBM Concert 1.0.0 through 2.1.0 for Z hub framework is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-59793

Publication date:
17/02/2026
Rocket TRUfusion Enterprise through 7.10.5 exposes the endpoint at /axis2/services/WsPortalV6UpDwAxis2Impl to authenticated users to be able to upload files. However, the application doesn&amp;#39;t properly sanitize the jobDirectory parameter, which allows path traversal sequences to be included. This allows writing files to arbitrary local filesystem locations and may subsequently lead to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2024-43178

Publication date:
17/02/2026
IBM Concert 1.0.0 through 2.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2026-1452

Publication date:
17/02/2026
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026

CVE-2025-36425

Publication date:
17/02/2026
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.3 could allow an authenticated user to obtain sensitive information under specific HADR configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
17/02/2026