Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-33516

Publication date:
17/04/2026
xrdp is an open source RDP server. Versions through 0.10.5 contain an out-of-bounds read vulnerability during the RDP capability exchange phase. The issue occurs when memory is accessed before validating the remaining buffer length. A remote, unauthenticated attacker can trigger this vulnerability by sending a specially crafted Confirm Active PDU. Successful exploitation could lead to a denial of service (process crash) or potential disclosure of sensitive information from the process memory. This issue has been fixed in version 0.10.6.
Severity CVSS v4.0: HIGH
Last modification:
27/04/2026

CVE-2026-32624

Publication date:
17/04/2026
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
Severity CVSS v4.0: MEDIUM
Last modification:
27/04/2026

CVE-2026-34232

Publication date:
17/04/2026
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the xdr_status_vector() function does not handle the isc_arg_cstring type when decoding an op_response packet, causing a server crash when one is encountered in the status vector. An unauthenticated attacker can exploit this by sending a crafted op_response packet to the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2026

CVE-2026-33569

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling <br /> on‑path attackers to sniff credentials and session data, which can be <br /> used to compromise the device.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-33093

Publication date:
17/04/2026
Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device that captures<br /> a photo with the front facing camera, exposing visual information about<br /> the deployment environment.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-32648

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that discloses debug <br /> configuration details (e.g., SSH/RTTY status), assisting attackers in <br /> reconnaissance against the device.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-32650

Publication date:
17/04/2026
Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable <br /> encryption, causing database credentials to be sent in plaintext and <br /> enabling unauthorized database access.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-32623

Publication date:
17/04/2026
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in the NeutrinoRDP module. When proxying RDP sessions from xrdp to another server, the module fails to properly validate the size of reassembled fragmented virtual channel data against its allocated memory buffer. A malicious downstream RDP server (or an attacker capable of performing a Man-in-the-Middle attack) could exploit this flaw to cause memory corruption, potentially leading to a Denial of Service (DoS) or Remote Code Execution (RCE). The NeutrinoRDP module is not built by default. This vulnerability only affects environments where the module has been explicitly compiled and enabled. Users can verify if the module is built by checking for --enable-neutrinordp in the output of the xrdp -v command. This issue has been fixed in version 0.10.6.
Severity CVSS v4.0: HIGH
Last modification:
27/04/2026

CVE-2026-32107

Publication date:
17/04/2026
xrdp is an open source RDP server. In versions through 0.10.5, the session execution component did not properly handle an error during the privilege drop process. This improper privilege management could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code on the system. An additional exploit would be needed to facilitate this. This issue has been fixed in version 0.10.6.
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2026

CVE-2026-32105

Publication date:
17/04/2026
xrdp is an open source RDP server. In versions through 0.10.5, xrdp does not implement verification for the Message Authentication Code (MAC) signature of encrypted RDP packets when using the "Classic RDP Security" layer. While the sender correctly generates signatures, the receiving logic lacks the necessary implementation to validate the 8-byte integrity signature, causing it to be silently ignored. An unauthenticated attacker with man-in-the-middle (MITM) capabilities can exploit this missing check to modify encrypted traffic in transit without detection. It does not affect connections where the TLS security layer is enforced. This issue has been fixed in version 0.10.6. If users are unable to immediately upgrade, they should configure xrdp.ini to enforce TLS security (security_layer=tls) to ensure end-to-end integrity.
Severity CVSS v4.0: CRITICAL
Last modification:
27/04/2026

CVE-2026-32324

Publication date:
17/04/2026
Anviz CX7 Firmware is <br /> vulnerable because the application embeds reusable certificate/key <br /> material, enabling decryption of MQTT traffic and potential interaction <br /> with device messaging channels at scale.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026

CVE-2026-31927

Publication date:
17/04/2026
Anviz CX7 Firmware is vulnerable to an authenticated CSV upload which allows path traversal <br /> to overwrite arbitrary files (e.g., /etc/shadow), enabling unauthorized <br /> SSH access when combined with debug‑setting changes
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2026