Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-34479

Publication date:
10/04/2026
The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.<br /> <br /> Two groups of users are affected:<br /> <br /> * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.<br /> * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.<br /> <br /> <br /> Users are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.<br /> <br /> Note: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.
Severity CVSS v4.0: MEDIUM
Last modification:
06/05/2026

CVE-2026-29043

Publication date:
10/04/2026
HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file parsed by HDF5 can trigger a write-based heap buffer overflow condition in the H5T__ref_mem_setnull method. This can lead to a denial-of-service condition, and potentially further issues such as remote code execution depending on the practical exploitability of the heap overflow against modern operating systems.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-29002

Publication date:
10/04/2026
CouchCMS contains a privilege escalation vulnerability that allows authenticated Admin-level users to create SuperAdmin accounts by tampering with the f_k_levels_list parameter in user creation requests. Attackers can modify the parameter value from 4 to 10 in the HTTP request body to bypass authorization validation and gain full application control, circumventing restrictions on SuperAdmin account creation and privilege assignment.
Severity CVSS v4.0: HIGH
Last modification:
16/04/2026

CVE-2026-23781

Publication date:
10/04/2026
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A set of default debug user credentials is hardcoded in cleartext within the application package. If left unchanged, these credentials can be easily obtained and may allow unauthorized access to the MFT API debug interface.
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2026

CVE-2026-34477

Publication date:
10/04/2026
The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the element.<br /> <br /> Although the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.<br /> <br /> A network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:<br /> <br /> * An SMTP, Socket, or Syslog appender is in use.<br /> * TLS is configured via a nested element.<br /> * The attacker can present a certificate issued by a CA trusted by the appender&amp;#39;s configured trust store, or by the default Java trust store if none is configured.<br /> This issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.<br /> <br /> Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
06/05/2026

CVE-2026-36235

Publication date:
10/04/2026
A SQL injection vulnerability was found in the scheduleSubList.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that the &amp;#39;subjcode&amp;#39; parameter is directly embedded into the SQL query via string interpolation without any sanitization or validation.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2026

CVE-2026-36236

Publication date:
10/04/2026
SourceCodester Engineers Online Portal v1.0 is vulnerable to SQL Injection in update_password.php via the new_password parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2026

CVE-2026-36232

Publication date:
10/04/2026
A SQL injection vulnerability was found in the instructorClasses.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that the &amp;#39;classId&amp;#39; parameter from $_GET[&amp;#39;classId&amp;#39;] is directly concatenated into the SQL query without any sanitization or validation.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2026

CVE-2026-36233

Publication date:
10/04/2026
A SQL injection vulnerability was found in the assignInstructorSubjects.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that attackers can inject malicious code via the parameter "subjcode" and use it directly in SQL queries without the need for appropriate cleaning or validation.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2026

CVE-2026-36234

Publication date:
10/04/2026
itsourcecode Online Student Enrollment System v1.0 is vulnerable to SQL Injection in newCourse.php via the &amp;#39;coursename&amp;#39; parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2026

CVE-2026-31262

Publication date:
10/04/2026
Cross Site Scripting vulnerability in Altenar Sportsbook Software Platform (SB2) v.2.0 allows a remote attacker to obtain sensitive information and execute arbitrary code via the URL parameter
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2026

CVE-2026-23782

Publication date:
10/04/2026
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API management endpoint allows unauthenticated users to obtain both an API identifier and its corresponding secret value. With these exposed secrets, an attacker could invoke privileged API operations, potentially leading to unauthorized access.
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2026