Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-47392

Publication date:
06/04/2026
Memory corruption when decoding corrupted satellite data files with invalid signature offsets.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2025-47374

Publication date:
06/04/2026
Memory Corruption when accessing freed memory due to concurrent fence deregistration and signal handling.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2025-47389

Publication date:
06/04/2026
Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2025-47390

Publication date:
06/04/2026
Memory corruption while preprocessing IOCTL request in JPEG driver.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2025-47391

Publication date:
06/04/2026
Memory corruption while processing a frame request from user.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2026

CVE-2024-14032

Publication date:
06/04/2026
Twitch Studio version 0.114.8 and prior contain a privilege escalation vulnerability in its privileged helper tool that allows local attackers to execute arbitrary code as root by exploiting an unprotected XPC service. Attackers can invoke the installFromPath:toPath:withReply: method to overwrite system files and privileged binaries, achieving full system compromise. Twitch Studio was discontinued in May 2024.
Severity CVSS v4.0: HIGH
Last modification:
14/04/2026

CVE-2026-5664

Publication date:
06/04/2026
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-30078. Reason: This candidate is a reservation duplicate of CVE-2026-30078. Notes: All CVE users should reference CVE-2026-30078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Severity CVSS v4.0: Pending analysis
Last modification:
06/04/2026

CVE-2026-5663

Publication date:
06/04/2026
A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible. The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
27/04/2026

CVE-2026-5661

Publication date:
06/04/2026
A vulnerability was identified in Free5GC 4.2.0. This affects an unknown function of the component NGSetupRequest Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit is publicly available and might be used.
Severity CVSS v4.0: MEDIUM
Last modification:
27/04/2026

CVE-2026-34885

Publication date:
06/04/2026
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2026-34897

Publication date:
06/04/2026
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Lingren Media LIbrary Assistant allows Stored XSS.This issue affects Media LIbrary Assistant: from n/a through 3.34.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2026

CVE-2026-33540

Publication date:
06/04/2026
Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream registry. The realm URL from a bearer challenge is used without validating that it matches the upstream registry host. As a result, an attacker-controlled upstream (or an attacker with MitM position to the upstream) can cause distribution to send the configured upstream credentials via basic auth to an attacker-controlled realm URL. This vulnerability is fixed in 3.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2026