Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-34857

Publication date:
13/04/2026
UAF vulnerability in the communication module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-34858

Publication date:
13/04/2026
UAF vulnerability in the communication module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-34859

Publication date:
13/04/2026
UAF vulnerability in the kernel module.<br /> Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-34861

Publication date:
13/04/2026
Race condition vulnerability in the thermal management module.<br /> Impact: Successful exploitation of this vulnerability may affect availability.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-21003

Publication date:
13/04/2026
Improper input validation in data related to network restrictions prior to SMR Apr-2026 Release 1 allows physical attackers to bypass the restrictions.
Severity CVSS v4.0: MEDIUM
Last modification:
13/04/2026

CVE-2026-25206

Publication date:
13/04/2026
Out-of-bounds read vulnerability in Samsung Open Source Escargot allows Resource Leak Exposure.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-25207

Publication date:
13/04/2026
Out-of-bounds write vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-25208

Publication date:
13/04/2026
Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-25205

Publication date:
13/04/2026
Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows out-of-bounds write.This issue affects Escargot:commit hash <br /> 97e8115ab1110bc502b4b5e4a0c689a71520d335<br /> <br /> .
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-25209

Publication date:
13/04/2026
Out-of-bounds read vulnerability in Samsung Open Source Escargot allows Resource Leak Exposure.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-6157

Publication date:
13/04/2026
A vulnerability was detected in Totolink A800R 4.1.2cu.5137_B20200730. This impacts the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. The manipulation of the argument apcliSsid results in buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.
Severity CVSS v4.0: HIGH
Last modification:
13/04/2026

CVE-2026-6155

Publication date:
13/04/2026
A weakness has been identified in Totolink A7100RU 7.4cu.2313. The impacted element is the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument pppoeServiceName can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Severity CVSS v4.0: HIGH
Last modification:
13/04/2026