Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-27904

Publication date:
17/02/2026
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2025-13108

Publication date:
17/02/2026
IBM DB2 Merge Backup for Linux, UNIX and Windows 12.1.0.0 could allow an attacker to access sensitive information in memory due to the buffer not properly clearing resources.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2025-27898

Publication date:
17/02/2026
IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 does not invalidate session after a timeout which could allow an authenticated user to impersonate another user on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2023-38265

Publication date:
17/02/2026
IBM Cloud Pak System 2.3.3.6, 2.3.3.7, 2.3.4.0, 2.3.4.1, and 2.3.5.0 could disclose folder location information to an unauthenticated attacker that could aid in further attacks against the system.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2026-2630

Publication date:
17/02/2026
A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2026-26736

Publication date:
17/02/2026
TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function.
Severity CVSS v4.0: Pending analysis
Last modification:
09/03/2026

CVE-2026-26732

Publication date:
17/02/2026
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2026

CVE-2026-26731

Publication date:
17/02/2026
TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the routernamer`parameter in the formDnsv6 function.
Severity CVSS v4.0: Pending analysis
Last modification:
16/03/2026

CVE-2026-24733

Publication date:
17/02/2026
Improper Input Validation vulnerability in Apache Tomcat.<br /> <br /> <br /> Tomcat did not limit HTTP/0.9 requests to the GET method. If a security <br /> constraint was configured to allow HEAD requests to a URI but deny GET <br /> requests, the user could bypass that constraint on GET requests by <br /> sending a (specification invalid) HEAD request using HTTP/0.9.<br /> <br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.<br /> <br /> <br /> Older, EOL versions are also affected.<br /> <br /> Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2026

CVE-2026-24734

Publication date:
17/02/2026
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.<br /> <br /> When using an OCSP responder, Tomcat Native (and Tomcat&amp;#39;s FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.<br /> <br /> This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.<br /> <br /> <br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.<br /> <br /> Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.<br /> <br /> Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2026

CVE-2025-66614

Publication date:
17/02/2026
Improper Input Validation vulnerability.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.<br /> <br /> The following versions were EOL at the time the CVE was created but are <br /> known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.<br /> Tomcat did not validate that the host name provided via the SNI <br /> extension was the same as the host name provided in the HTTP host header <br /> field. If Tomcat was configured with more than one virtual host and the <br /> TLS configuration for one of those hosts did not require client <br /> certificate authentication but another one did, it was possible for a <br /> client to bypass the client certificate authentication by sending <br /> different host names in the SNI extension and the HTTP host header field.<br /> <br /> <br /> <br /> The vulnerability only applies if client certificate authentication is <br /> only enforced at the Connector. It does not apply if client certificate <br /> authentication is enforced at the web application.<br /> <br /> <br /> Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2026

CVE-2025-36019

Publication date:
17/02/2026
IBM Concert 1.0.0 through 2.1.0 for Z hub framework is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2026