Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-31786

Publication date:
30/04/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Buffer overflow in drivers/xen/sys-hypervisor.c<br /> <br /> The build id returned by HYPERVISOR_xen_version(XENVER_build_id) is<br /> neither NUL terminated nor a string.<br /> <br /> The first causes a buffer overflow as sprintf in buildid_show will<br /> read and copy till it finds a NUL.<br /> <br /> 00000000 f4 91 51 f4 dd 38 9e 9d 65 47 52 eb 10 71 db 50 |..Q..8..eGR..q.P|<br /> 00000010 b9 a8 01 42 6f 2e 32 |...Bo.2|<br /> 00000017<br /> <br /> So use a memcpy instead of sprintf to have the correct value:<br /> <br /> 00000000 f4 91 51 f4 dd 00 9e 9d 65 47 52 eb 10 71 db 50 |..Q.....eGR..q.P|<br /> 00000010 b9 a8 01 42 |...B|<br /> 00000014<br /> <br /> (the above have a hack to embed a zero inside and check it&amp;#39;s<br /> returned correctly).<br /> <br /> This is XSA-485 / CVE-2026-31786
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026

CVE-2026-31692

Publication date:
30/04/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rtnetlink: add missing netlink_ns_capable() check for peer netns<br /> <br /> rtnl_newlink() lacks a CAP_NET_ADMIN capability check on the peer<br /> network namespace when creating paired devices (veth, vxcan,<br /> netkit). This allows an unprivileged user with a user namespace<br /> to create interfaces in arbitrary network namespaces, including<br /> init_net.<br /> <br /> Add a netlink_ns_capable() check for CAP_NET_ADMIN in the peer<br /> namespace before allowing device creation to proceed.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2026

CVE-2026-42800

Publication date:
30/04/2026
NULL pointer dereference vulnerability in ASR1903 in ASR Lapwing_Linux on Linux (ims_client modules) allows Pointer Manipulation.<br /> <br /> This vulnerability is associated with program files sip/utils/src/sipuri.c.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-41016

Publication date:
30/04/2026
Apache Airflow&amp;#39;s SMTP provider `SmtpHook` called Python&amp;#39;s `smtplib.SMTP.starttls()` without an SSL context, so no certificate validation was performed on the TLS upgrade. A man-in-the-middle between the Airflow worker and the SMTP server could present a self-signed certificate, complete the STARTTLS upgrade, and capture the SMTP credentials sent during the subsequent `login()` call. Users are advised to upgrade to the `apache-airflow-providers-smtp` version that contains the fix.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-39457

Publication date:
30/04/2026
When exchanging data over a socket, libnv uses select(2) to wait for data to arrive. However, it does not verify whether the provided socket descriptor fits in select(2)&amp;#39;s file descriptor set size limit of FD_SETSIZE (1024).<br /> <br /> An attacker who is able to force a libnv application to allocate large file descriptors, e.g., by opening many descriptors and executing a program which is not careful to close them upon startup, can trigger stack corruption. If the target application is setuid-root, then this could be used to elevate local privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-35547

Publication date:
30/04/2026
When processing the header of an incoming message, libnv failed to properly validate the message size.<br /> <br /> The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-42512

Publication date:
30/04/2026
As dhclient is building an environment to pass to dhclient-script, it may need to resize the array of string pointers. The code which expands the array incorrectly calculates its new size when requesting memory, resulting in a heap buffer overrun.<br /> <br /> A specially crafted packet can cause dhclient to overrun its buffer of environment entries. This can result in a crash, but it may be possible to leverage this bug to achieve remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-42799

Publication date:
30/04/2026
Out-of-bounds read vulnerability in ASR Kestrel (nr_fw modules) allows Overflow Buffers.<br /> <br /> This vulnerability is associated with program files Code/Nr/nr_fw/RA/src/NrPwrCtrl.C.<br /> <br /> <br /> <br /> This issue affects Kestrel: before 2026/02/10.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-22070

Publication date:
30/04/2026
ColorOS Assistant has an unauthenticated start-download channel, leading to file path traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2026

CVE-2026-7164

Publication date:
30/04/2026
Incorrect packet validation allowed unbounded recursion parsing SCTP chunk parameters. This can eventually result in a stack overflow and panic.<br /> <br /> Remote attackers can craft packets which cause affected systems to panic. This affects any system where pf is configured to process traffic, independent of the configured ruleset.
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6870

Publication date:
30/04/2026
GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026

CVE-2026-6869

Publication date:
30/04/2026
WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Severity CVSS v4.0: Pending analysis
Last modification:
01/05/2026