Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-43864

Publication date:
04/05/2026
mutt before 2.3.2 has a show_sig_summary NULL pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-7738

Publication date:
04/05/2026
A security flaw has been discovered in puchunjie doc-tools-mcp 1.0.18. This affects the function create_document/open_document of the file src/mcp-server.ts of the component MCP Interface. The manipulation of the argument filePath results in path traversal. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Severity CVSS v4.0: LOW
Last modification:
05/05/2026

CVE-2026-5335

Publication date:
04/05/2026
The Magic Export & Import WordPress plugin before 1.2.0 stores exported CSV files at a publicly accessible location, making it possible for any visitors to leak sensitive user information.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-7736

Publication date:
04/05/2026
A vulnerability was determined in osrg GoBGP up to 4.3.0. Affected by this vulnerability is the function parseRibEntry of the file pkg/packet/mrt/mrt.go. Executing a manipulation can lead to integer underflow. It is possible to launch the attack remotely. Upgrading to version 4.4.0 addresses this issue. This patch is called 76d911046344a3923cbe573364197aa081944592. It is suggested to upgrade the affected component.
Severity CVSS v4.0: MEDIUM
Last modification:
06/05/2026

CVE-2026-7737

Publication date:
04/05/2026
A vulnerability was identified in osrg GoBGP up to 4.3.0. Affected by this issue is the function BMPPeerUpNotification.ParseBody/BMPStatisticsReport.ParseBody of the file pkg/packet/bmp/bmp.go of the component BMP Parser. The manipulation leads to out-of-bounds read. The attack can be initiated remotely. Upgrading to version 4.4.0 can resolve this issue. The identifier of the patch is bc77597d42335c78464bc8e15a471d887bbdf260. Upgrading the affected component is recommended.
Severity CVSS v4.0: MEDIUM
Last modification:
06/05/2026

CVE-2026-43859

Publication date:
04/05/2026
mutt before 2.3.2 sometimes uses strfcpy instead of memcpy for the IMAP auth_cram MD5 digest.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-43860

Publication date:
04/05/2026
mutt before 2.3.2 sometimes truncates the hash_passwd by one byte for IMAP auth_cram MD5 digest.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-43861

Publication date:
04/05/2026
mutt before 2.3.2 does not check for '\0' in url_pct_decode.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-43862

Publication date:
04/05/2026
In mutt before 2.3.2, the imap_auth_gss security level is mishandled.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-29200

Publication date:
04/05/2026
A critical IDOR vulnerability has been discovered in Comet Backup affecting all versions from 20.11.0 to 26.1.1 and 26.2.1. The vulnerability allows a tenant administrator to impersonate any end-user account of other tenants on the same server via a vulnerable API call.
Severity CVSS v4.0: CRITICAL
Last modification:
06/05/2026

CVE-2026-20451

Publication date:
04/05/2026
In slbc, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10828685; Issue ID: MSV-6504.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026

CVE-2026-20450

Publication date:
04/05/2026
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01753620; Issue ID: MSV-6100.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2026