Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-6532

Publication date:
30/04/2026
Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6531

Publication date:
30/04/2026
SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6530

Publication date:
30/04/2026
DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6529

Publication date:
30/04/2026
iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6528

Publication date:
30/04/2026
TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6520

Publication date:
30/04/2026
OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6519

Publication date:
30/04/2026
MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6524

Publication date:
30/04/2026
MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6523

Publication date:
30/04/2026
GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6522

Publication date:
30/04/2026
RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6521

Publication date:
30/04/2026
OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6527

Publication date:
30/04/2026
ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026