Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-25615

Publication date:
03/02/2026
Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5668.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-25616

Publication date:
03/02/2026
Blesta 3.x through 5.x before 5.13.3 mishandles input validation, aka CORE-5665.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-1846

Publication date:
03/02/2026
Rejected reason: loading template...
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-24149

Publication date:
03/02/2026
NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, data tampering.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-24434

Publication date:
03/02/2026
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior does not implement CSRF protections for administrative functions in the web management interface. The interface does not enforce anti-CSRF tokens or robust origin validation, which can allow an attacker to induce a logged-in administrator to perform unintended state-changing requests and modify router settings.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2026-24441

Publication date:
03/02/2026
Shenzhen Tenda AC7 firmware version V03.03.03.01_cn and prior expose account credentials in plaintext within HTTP responses, allowing an on-path attacker to obtain sensitive authentication material.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026

CVE-2026-25614

Publication date:
03/02/2026
Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2025-64098

Publication date:
03/02/2026
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group<br /> ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an <br /> SPDP packet sent by a publisher causes an Out-Of-Memory (OOM) condition, resulting in remote termination of Fast-DDS. If t<br /> he fields of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specifically by ta<br /> mpering with the the `vecsize` value read by `readOctetVector` — a 32-bit integer overflow can occur, causing `std::vector<br /> ::resize` to request an attacker-controlled size and quickly trigger OOM and remote process termination. Versions 3.4.1, 3<br /> .3.1, and 2.6.11 patch the issue.
Severity CVSS v4.0: LOW
Last modification:
03/02/2026

CVE-2025-64438

Publication date:
03/02/2026
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group<br /> ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a remotely triggerable Out-of-Memory (OOM) denial-of-service exists in Fast<br /> -DDS when processing RTPS GAP submessages under RELIABLE QoS. By sending a tiny GAP packet with a huge gap range (`gapList<br /> .base - gapStart`), an attacker drives `StatefulReader::processGapMsg()` into an unbounded loop that inserts millions of s<br /> equence numbers into `WriterProxy::changes_received_` (`std::set`), causing multi-GB heap growth and process termination. <br /> No authentication is required beyond network reachability to the reader on the DDS domain. In environments without an RSS <br /> limit (non-ASan / unlimited), memory consumption was observed to rise to ~64 GB. Versions 3.4.1, 3.3.1, and 2.6.11 patch t<br /> he issue.
Severity CVSS v4.0: LOW
Last modification:
03/02/2026

CVE-2026-1803

Publication date:
03/02/2026
A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026

CVE-2025-62601

Publication date:
03/02/2026
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group<br /> ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an <br /> SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields <br /> of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage — specifically by tampering with the `str_size` <br /> value read by `readString` (called from `readBinaryProperty`) — are modified, a 32-bit integer overflow can occur, causing<br /> `std::vector::resize` to use an attacker-controlled size and quickly trigger heap buffer overflow and remote process term<br /> ination. Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
Severity CVSS v4.0: LOW
Last modification:
03/02/2026

CVE-2025-62602

Publication date:
03/02/2026
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group<br /> ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an <br /> SPDP packet sent by a publisher causes a heap buffer overflow, resulting in remote termination of Fast-DDS. If the fields <br /> of `PID_IDENTITY_TOKEN` or `PID_PERMISSIONS_TOKEN` in the DATA Submessage are tampered with — specially `readOctetVector`<br /> reads an unchecked `vecsize` that is propagated unchanged into `readData` as the `length` parameter — the attacker-contro<br /> lled `vecsize` can trigger a 32-bit integer overflow during the `length` calculation. That overflow can cause large alloca<br /> tion attempt that quickly leads to OOM, enabling a remotely-triggerable denial-of-service and remote process termination. <br /> Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
Severity CVSS v4.0: LOW
Last modification:
03/02/2026