Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-2100

Publication date:
26/03/2026
A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2026-2271

Publication date:
26/03/2026
A flaw was found in GIMP's PSP (Paint Shop Pro) file parser. A remote attacker could exploit an integer overflow vulnerability in the read_creator_block() function by providing a specially crafted PSP image file. This vulnerability occurs when a 32-bit length value from the file is used for memory allocation without proper validation, leading to a heap overflow and an out-of-bounds write. Successful exploitation could result in an application level denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2026-2239

Publication date:
26/03/2026
A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2026-2272

Publication date:
26/03/2026
A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises because a size calculation for image buffers can wrap around due to a 32-bit integer evaluation, allowing oversized image headers to bypass security checks. A remote attacker could exploit this by providing a specially crafted ICO file, leading to a buffer overflow and memory corruption, which may result in an application level denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2026-21724

Publication date:
26/03/2026
A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the required alert.notifications.receivers.protected:write permission.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2026-0968

Publication date:
26/03/2026
A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.
Severity CVSS v4.0: Pending analysis
Last modification:
03/04/2026

CVE-2026-0964

Publication date:
26/03/2026
A malicious SCP server can send unexpected paths that could make the<br /> client application override local files outside of working directory.<br /> This could be misused to create malicious executable or configuration<br /> files and make the user execute them under specific consequences.<br /> <br /> This is the same issue as in OpenSSH, tracked as CVE-2019-6111.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2026-0966

Publication date:
26/03/2026
The API function `ssh_get_hexa()` is vulnerable, when 0-lenght<br /> input is provided to this function. This function is used internally<br /> in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated),<br /> which is vulnerable to the same input (length is provided by the<br /> calling application).<br /> <br /> The function is also used internally in the gssapi code for logging<br /> the OIDs received by the server during GSSAPI authentication. This<br /> could be triggered remotely, when the server allows GSSAPI authentication<br /> and logging verbosity is set at least to SSH_LOG_PACKET (3). This<br /> could cause self-DoS of the per-connection daemon process.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2026-0967

Publication date:
26/03/2026
A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-0965

Publication date:
26/03/2026
A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2026

CVE-2026-33631

Publication date:
26/03/2026
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. In versions on the 4.1 branch and earlier, the opfilter Endpoint Security system extension enforced file access policy exclusively by intercepting ES_EVENT_TYPE_AUTH_OPEN events. Seven additional file operation event types were not intercepted, allowing any locally running process to bypass the configured FAA policy without triggering a denial. Commit a3d1733 adds subscriptions for all seven event types and routes them through the existing FAA policy evaluator. AUTH_RENAME and AUTH_UNLINK additionally preserve XProtect change detection: events on the XProtect path are allowed and trigger the existing onXProtectChanged callback rather than being evaluated against user policy. All versions on the 4.2 branch contain the fix. No known workarounds are available.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2026

CVE-2026-33632

Publication date:
26/03/2026
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE — were not intercepted by ClearanceKit&amp;#39;s opfilter system extension, allowing local processes to bypass file access policies. Commit 6181c4a patches the vulnerability by subscribing to both event types and routing them through the existing policy evaluator. Users must upgrade to v4.2.4 or later and reactivate the system extension.
Severity CVSS v4.0: HIGH
Last modification:
30/03/2026