Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-1619

Publication date:
13/02/2026
Authorization Bypass Through User-Controlled Key vulnerability in Universal Software Inc. FlexCity/Kiosk allows Exploitation of Trusted Identifiers.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2026-23111

Publication date:
13/02/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()<br /> <br /> nft_map_catchall_activate() has an inverted element activity check<br /> compared to its non-catchall counterpart nft_mapelem_activate() and<br /> compared to what is logically required.<br /> <br /> nft_map_catchall_activate() is called from the abort path to re-activate<br /> catchall map elements that were deactivated during a failed transaction.<br /> It should skip elements that are already active (they don&amp;#39;t need<br /> re-activation) and process elements that are inactive (they need to be<br /> restored). Instead, the current code does the opposite: it skips inactive<br /> elements and processes active ones.<br /> <br /> Compare the non-catchall activate callback, which is correct:<br /> <br /> nft_mapelem_activate():<br /> if (nft_set_elem_active(ext, iter-&gt;genmask))<br /> return 0; /* skip active, process inactive */<br /> <br /> With the buggy catchall version:<br /> <br /> nft_map_catchall_activate():<br /> if (!nft_set_elem_active(ext, genmask))<br /> continue; /* skip inactive, process active */<br /> <br /> The consequence is that when a DELSET operation is aborted,<br /> nft_setelem_data_activate() is never called for the catchall element.<br /> For NFT_GOTO verdict elements, this means nft_data_hold() is never<br /> called to restore the chain-&gt;use reference count. Each abort cycle<br /> permanently decrements chain-&gt;use. Once chain-&gt;use reaches zero,<br /> DELCHAIN succeeds and frees the chain while catchall verdict elements<br /> still reference it, resulting in a use-after-free.<br /> <br /> This is exploitable for local privilege escalation from an unprivileged<br /> user via user namespaces + nftables on distributions that enable<br /> CONFIG_USER_NS and CONFIG_NF_TABLES.<br /> <br /> Fix by removing the negation so the check matches nft_mapelem_activate():<br /> skip active elements, process inactive ones.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2026-23112

Publication date:
13/02/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec<br /> <br /> nvmet_tcp_build_pdu_iovec() could walk past cmd-&gt;req.sg when a PDU<br /> length or offset exceeds sg_cnt and then use bogus sg-&gt;length/offset<br /> values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining<br /> entries, and sg-&gt;length/offset before building the bvec.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2025-14349

Publication date:
13/02/2026
Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2026-1618

Publication date:
13/02/2026
Authentication Bypass Using an Alternate Path or Channel vulnerability in Universal Software Inc. FlexCity/Kiosk allows Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.
Severity CVSS v4.0: Pending analysis
Last modification:
02/03/2026

CVE-2026-2443

Publication date:
13/02/2026
A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.
Severity CVSS v4.0: Pending analysis
Last modification:
23/03/2026

CVE-2025-33042

Publication date:
13/02/2026
Improper Control of Generation of Code (&amp;#39;Code Injection&amp;#39;) vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas.<br /> <br /> This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0.<br /> <br /> Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2026

CVE-2026-22892

Publication date:
13/02/2026
Mattermost versions 11.1.x
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2026

CVE-2026-20796

Publication date:
13/02/2026
Mattermost versions 10.11.x
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2026-0872

Publication date:
13/02/2026
Improper Certificate Validation vulnerability in Thales SafeNet Agent for Windows Logon on Windows allows Signature Spoofing by Improper Validation.This issue affects SafeNet Agent for Windows Logon: 4.0.0, 4.1.1, 4.1.2.
Severity CVSS v4.0: LOW
Last modification:
15/04/2026

CVE-2025-48021

Publication date:
13/02/2026
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.<br /> If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.<br /> The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity CVSS v4.0: MEDIUM
Last modification:
02/03/2026

CVE-2025-48022

Publication date:
13/02/2026
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.<br /> If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.<br /> The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Severity CVSS v4.0: MEDIUM
Last modification:
02/03/2026