Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-27913

Publication date:
14/04/2026
Improper input validation in Windows BitLocker allows an unauthorized attacker to bypass a security feature locally.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-27912

Publication date:
14/04/2026
Improper authorization in Windows Kerberos allows an authorized attacker to elevate privileges over an adjacent network.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-27911

Publication date:
14/04/2026
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-27910

Publication date:
14/04/2026
Improper handling of insufficient permissions or privileges in Windows Installer allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-27909

Publication date:
14/04/2026
Use after free in Microsoft Windows Search Component allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-27908

Publication date:
14/04/2026
Use after free in Windows TDI Translation Driver (tdx.sys) allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-27907

Publication date:
14/04/2026
Integer underflow (wrap or wraparound) in Windows Storage Spaces Controller allows an authorized attacker to elevate privileges locally.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026

CVE-2026-27288

Publication date:
14/04/2026
Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a crafted webpage.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2026-27258

Publication date:
14/04/2026
DNG SDK versions 1.7.1 2502 and earlier are affected by an out-of-bounds write vulnerability that could lead to application denial-of-service. An attacker could leverage this vulnerability to corrupt memory, causing the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2026-27246

Publication date:
14/04/2026
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2026-27303

Publication date:
14/04/2026
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
Severity CVSS v4.0: Pending analysis
Last modification:
28/04/2026

CVE-2026-27906

Publication date:
14/04/2026
Improper input validation in Windows Hello allows an authorized attacker to bypass a security feature locally.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2026