Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-47915

Publication date:
01/02/2026
PHP Melody version 3.0 contains a remote SQL injection vulnerability in the video edit module that allows authenticated attackers to inject malicious SQL commands. Attackers can exploit the unvalidated 'vid' parameter to execute arbitrary database queries and potentially compromise the web application and database management system.
Severity CVSS v4.0: HIGH
Last modification:
01/02/2026

CVE-2021-47916

Publication date:
01/02/2026
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: HIGH
Last modification:
01/02/2026

CVE-2021-47856

Publication date:
01/02/2026
Easy Cart Shopping Cart 2021 contains a non-persistent cross-site scripting vulnerability in the search module's keyword parameter. Remote attackers can inject malicious script code through the search input to compromise user sessions and manipulate application content.
Severity CVSS v4.0: MEDIUM
Last modification:
01/02/2026

CVE-2021-47885

Publication date:
01/02/2026
Multiple payment terminal versions contain non-persistent cross-site scripting vulnerabilities in billing and payment information input fields. Attackers can inject malicious script code through vulnerable parameters to manipulate client-side requests and potentially execute session hijacking or phishing attacks.
Severity CVSS v4.0: MEDIUM
Last modification:
01/02/2026

CVE-2021-47908

Publication date:
01/02/2026
Ultimate POS 4.4 contains a persistent cross-site scripting vulnerability in the product name parameter that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability through product add or edit functions to execute arbitrary JavaScript and potentially hijack user sessions.
Severity CVSS v4.0: MEDIUM
Last modification:
01/02/2026

CVE-2021-47909

Publication date:
01/02/2026
Mult-E-Cart Ultimate 2.4 contains multiple SQL injection vulnerabilities in inventory, customer, vendor, and order modules. Remote attackers with privileged vendor or admin roles can exploit the 'id' parameter to execute malicious SQL commands and compromise the database management system.
Severity CVSS v4.0: HIGH
Last modification:
01/02/2026

CVE-2026-25069

Publication date:
01/02/2026
SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service.
Severity CVSS v4.0: CRITICAL
Last modification:
01/02/2026

CVE-2026-1165

Publication date:
31/01/2026
The Popup Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.1.1. This is due to a flawed nonce implementation in the 'publish_unpublish_popupbox' function that verifies a self-created nonce rather than one submitted in the request. This makes it possible for unauthenticated attackers to change the publish status of popups via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2026

CVE-2025-14554

Publication date:
31/01/2026
The Sell BTC - Cryptocurrency Selling Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'orderform_data' AJAX action in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in order records that will execute whenever an administrator accesses the Orders page in the admin dashboard. The vulnerability was partially patched in version 1.5.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2026

CVE-2026-23037

Publication date:
31/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: etas_es58x: allow partial RX URB allocation to succeed<br /> <br /> When es58x_alloc_rx_urbs() fails to allocate the requested number of<br /> URBs but succeeds in allocating some, it returns an error code.<br /> This causes es58x_open() to return early, skipping the cleanup label<br /> &amp;#39;free_urbs&amp;#39;, which leads to the anchored URBs being leaked.<br /> <br /> As pointed out by maintainer Vincent Mailhol, the driver is designed<br /> to handle partial URB allocation gracefully. Therefore, partial<br /> allocation should not be treated as a fatal error.<br /> <br /> Modify es58x_alloc_rx_urbs() to return 0 if at least one URB has been<br /> allocated, restoring the intended behavior and preventing the leak<br /> in es58x_open().
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2026

CVE-2026-23038

Publication date:
31/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node()<br /> <br /> In nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails,<br /> the function jumps to the out_scratch label without freeing the already<br /> allocated dsaddrs list, leading to a memory leak.<br /> <br /> Fix this by jumping to the out_err_drain_dsaddrs label, which properly<br /> frees the dsaddrs list before cleaning up other resources.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2026

CVE-2026-23039

Publication date:
31/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/gud: fix NULL fb and crtc dereferences on USB disconnect<br /> <br /> On disconnect drm_atomic_helper_disable_all() is called which<br /> sets both the fb and crtc for a plane to NULL before invoking a commit.<br /> <br /> This causes a kernel oops on every display disconnect.<br /> <br /> Add guards for those dereferences.
Severity CVSS v4.0: Pending analysis
Last modification:
31/01/2026