Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-27792

Publication date:
27/02/2026
Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. A missing authorization vulnerability has been identified in the application starting in version 2.7.0 and prior to version 3.1.0. It allows authenticated users to access and modify data belonging to other users. This issue is due to the absence of the `isOwnProfileOrAdmin()` middleware on several push subscription API routes. Version 3.1.0 fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27793

Publication date:
27/02/2026
Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Prior to version 3.1.0, the `GET /api/v1/user/:id` endpoint returns the full settings object for any user, including Pushover, Pushbullet, and Telegram credentials, to any authenticated requester regardless of their privilege level. This vulnerability can be exploited alone or combined with the reported unauthenticated account creation vulnerability, CVE-2026-27707. When combined, the two vulnerabilities create a zero-prior-access chain that leaks third-party API credentials for all users, including administrators. Version 3.1.0 contains a fix for both this vulnerability and for CVE-2026-27707.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27810

Publication date:
27/02/2026
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by any authenticated user and can also be triggered by tricking an authenticated victim into clicking a crafted link. Version 9.4.0 contains a fix for the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27824

Publication date:
27/02/2026
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where brute-force protection is the primary defense against credential stuffing and password guessing attacks. Version 9.4.0 contains a fix for the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27201

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27500

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27501

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27573

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27580

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27581

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27582

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-27583

Publication date:
27/02/2026
Rejected reason: Further research determined the situation described is not a vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026