Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-42076

Publication date:
04/05/2026
Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a command injection vulnerability in the _extractLLM() function allows attackers to execute arbitrary shell commands on the server. The function constructs a curl command using string concatenation and passes it to execSync() without proper sanitization, enabling remote code execution when the corpus parameter contains shell metacharacters. This issue has been patched in version 1.69.3.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-42077

Publication date:
04/05/2026
Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a prototype pollution vulnerability in the mailbox store module allows attackers to modify the behavior of all JavaScript objects by injecting malicious properties into Object.prototype. The vulnerability exists in the _applyUpdate() and _updateRecord() functions which use Object.assign() to merge user-controlled data without filtering dangerous keys like __proto__, constructor, or prototype. This issue has been patched in version 1.69.3.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-38669

Publication date:
04/05/2026
wCMS v.1.4 is vulnerable to Cross Site Scripting (XSS) when creating a new blog.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-40682

Publication date:
04/05/2026
XML External Entity (XXE) via Unsanitized Dictionary Parsing in Apache OpenNLP DictionaryEntryPersistor<br /> <br /> <br /> Versions Affected: before 2.5.9, before 3.0.0-M3<br /> <br /> <br /> Description: The DictionaryEntryPersistor class initializes a static SAXParserFactory at class-load time without enabling FEATURE_SECURE_PROCESSING or disabling DTD processing. When create(InputStream, EntryInserter) is invoked, the only feature set on the XMLReader is namespace support — external entity resolution and DOCTYPE declarations remain fully enabled. An attacker who can supply a crafted dictionary file (e.g., a stop-word list or domain dictionary) containing a malicious DOCTYPE declaration can trigger local file disclosure via file:// entity references or server-side request forgery via http:// entity references during SAX parsing, before the application processes a single dictionary entry. This is inconsistent with the project&amp;#39;s own XmlUtil.createSaxParser() helper, which correctly sets FEATURE_SECURE_PROCESSING and disallow-doctype-decl and is used by all other XML parsing paths in the codebase. The public Dictionary(InputStream) constructor delegates directly to this method and is the documented API for loading user-supplied dictionaries, making untrusted input a realistic scenario.<br /> <br /> <br /> Mitigation: 2.x users should upgrade to 2.5.9. 3.x users should upgrade to 3.0.0-M3. Users who cannot upgrade immediately should ensure that all dictionary files are sourced from trusted origins and should consider wrapping the Dictionary(InputStream) constructor with input validation that rejects any XML containing a DOCTYPE declaration before it reaches the parser.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026

CVE-2026-37461

Publication date:
04/05/2026
An out-of-bounds read in the ParseIP6Extended function (/bgp/bgp.go) of gobgp v4.3.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted BGP UPDATE message.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2026

CVE-2026-29514

Publication date:
04/05/2026
NetBox versions 4.3.5 through 4.5.4 contain a remote code execution vulnerability in the RenderTemplateMixin.get_environment_params() method that allows authenticated users with exporttemplate or configtemplate permissions to execute arbitrary code by specifying malicious Python callables in the environment_params field. Attackers can bypass Jinja2 SandboxedEnvironment protections by setting the finalize parameter to any importable Python callable such as subprocess.getoutput, which is invoked on every rendered expression outside the sandbox&amp;#39;s call interception mechanism, achieving remote code execution as the NetBox service user.
Severity CVSS v4.0: HIGH
Last modification:
05/05/2026

CVE-2026-26332

Publication date:
04/05/2026
vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, SuppressedError allows attackers to escape the sandbox and run arbitrary code. This issue has been patched in version 3.11.0.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026

CVE-2026-25293

Publication date:
04/05/2026
Buffer overflow due to incorrect authorization in PLC FW
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026

CVE-2026-25266

Publication date:
04/05/2026
Memory corruption while processing IOCTL command when device is in power-save state.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026

CVE-2026-26956

Publication date:
04/05/2026
vm2 is an open source vm/sandbox for Node.js. In version 3.10.4, vm2 is vulnerable to full sandbox escape with arbitrary code execution. Attacker code inside VM.run() obtains host process object and runs host commands with zero host cooperation. This issue has been patched in version 3.10.5.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2026

CVE-2025-47407

Publication date:
04/05/2026
Memory corruption while creating a process on the digital signal processor due to allocation failure at the kernel level.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026

CVE-2025-47408

Publication date:
04/05/2026
Memory corruption when another driver calls an IOCTL with invalid input/output buffer.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026