Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-40434

Publication date:
17/04/2026
Anviz CrossChex Standard<br /> lacks source verification in the client/server channel, enabling TCP <br /> packet injection by an attacker on the same network to alter or disrupt <br /> application traffic.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-40461

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that modify debug <br /> settings (e.g., enabling SSH), allowing unauthorized state changes that <br /> can facilitate later compromise.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-35061

Publication date:
17/04/2026
Anviz CX7 Firmware is vulnerable to the most recently captured test photo that can be <br /> retrieved without authentication, revealing sensitive operational <br /> imagery.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-35215

Publication date:
17/04/2026
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the sdl_desc() function does not validate the length of a decoded SDL descriptor from a slice packet. A zero-length descriptor is later used to calculate the number of slice items, causing a division by zero. An unauthenticated attacker can exploit this by sending a crafted slice packet to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-35546

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted <br /> archives to be accepted, enabling attackers to plant and execute code <br /> and obtain a reverse shell.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-35682

Publication date:
17/04/2026
Anviz CX2 Lite is vulnerable to an authenticated command injection via a <br /> filename parameter that enables arbitrary command execution (e.g., <br /> starting telnetd), resulting in root‑level access.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-40066

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unverified update packages that can be uploaded. The <br /> device unpacks and executes a script resulting in unauthenticated remote<br /> code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-40283

Publication date:
17/04/2026
WeGIA is a web manager for charitable institutions. In versions prior to 3.6.10, a Stored Cross-Site Scripting (XSS) vulnerability allows an authenticated user to inject malicious JavaScript via the "Nome" field in the "Informações Pacientes" page. The payload is stored and executed when the patient information is viewed. Version 3.6.10 fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-40342

Publication date:
17/04/2026
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library&amp;#39;s initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server&amp;#39;s OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-32624

Publication date:
17/04/2026
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
Severity CVSS v4.0: MEDIUM
Last modification:
17/04/2026

CVE-2026-32648

Publication date:
17/04/2026
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that discloses debug <br /> configuration details (e.g., SSH/RTTY status), assisting attackers in <br /> reconnaissance against the device.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026

CVE-2026-32650

Publication date:
17/04/2026
Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable <br /> encryption, causing database credentials to be sent in plaintext and <br /> enabling unauthorized database access.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2026