Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-14816

Publication date:
08/04/2026
Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials displayed in plain text in the GUI of the Hyper Historian Splitter feature by exploiting this vulnerability, when SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system.
Severity CVSS v4.0: CRITICAL
Last modification:
08/04/2026

CVE-2026-5301

Publication date:
08/04/2026
Stored XSS in log viewer in CoolerControl/coolercontrol-ui
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-5300

Publication date:
08/04/2026
Unauthenticated functionality in CoolerControl/coolercontrold
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-5302

Publication date:
08/04/2026
CORS misconfiguration in CoolerControl/coolercontrold
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-5600

Publication date:
08/04/2026
A new API endpoint introduced in pretix 2025 that is supposed to <br /> return all check-in events of a specific event in fact returns all <br /> check-in events belonging to the respective organizer. This allows an <br /> API consumer to access information for all other events under the same <br /> organizer, even those they should not have access to.<br /> <br /> <br /> These records contain information on the time and result of every ticket scan as well as the ID of the matched ticket. Example:<br /> <br /> <br /> {<br /> "id": 123,<br /> "successful": true,<br /> "error_reason": null,<br /> "error_explanation": null,<br /> "position": 321,<br /> "datetime": "2020-08-23T09:00:00+02:00",<br /> "list": 456,<br /> "created": "2020-08-23T09:00:00+02:00",<br /> "auto_checked_in": false,<br /> "gate": null,<br /> "device": 1,<br /> "device_id": 1,<br /> "type": "entry"<br /> }<br /> <br /> <br /> <br /> An unauthorized user usually has no way to match these IDs (position) back to individual people.
Severity CVSS v4.0: MEDIUM
Last modification:
24/04/2026

CVE-2026-4402

Publication date:
08/04/2026
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2026-27102

Publication date:
08/04/2026
Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 through 9.13.0.1, contains an incorrect privilege assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-28261

Publication date:
08/04/2026
Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, versions prior to 4.1.0.3 and version 4.2.0.0, contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to secret exposure. The attacker may be able to use the exposed secret to access the vulnerable system with privileges of the compromised account.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-24511

Publication date:
08/04/2026
Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 through 9.13.0.0, contains a generation of error message containing sensitive information vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2026

CVE-2026-5208

Publication date:
08/04/2026
Command injection in alerts in CoolerControl/coolercontrold
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-28264

Publication date:
08/04/2026
Dell PowerProtect Agent Service, version(s) prior to 20.1, contain(s) an Incorrect Permission Assignment for Critical Resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2026-2481

Publication date:
08/04/2026
The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &amp;#39;settings[js]&amp;#39; parameter in versions up to, and including, 2.10.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026