Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-43992

Publication date:
11/05/2026
Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains an authentication bypass by assumed-immutable data vulnerability in Geo replication. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access to data in transit.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2026

CVE-2024-0391

Publication date:
11/05/2026
The check user account lock states feature within the email OTP flow fails to validate user input, allowing an attacker to infer the existence of registered user accounts.<br /> <br /> The discovery of valid usernames can increase the risk of brute-force and social engineering attacks. Attackers can leverage this information to craft targeted phishing campaigns or other malicious activities aimed at tricking users into divulging sensitive data, potentially damaging the organization&amp;#39;s reputation and leading to regulatory non-compliance and financial consequences.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2026-43826

Publication date:
11/05/2026
The OpenSearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-opensearch` 1.9.1 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[opensearch] host` URL.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2026-41018

Publication date:
11/05/2026
The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-elasticsearch` 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[elasticsearch] host` URL.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2026-5084

Publication date:
11/05/2026
WebDyne::Session versions through 2.075 for Perl generates the session id insecurely.<br /> <br /> The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest.<br /> <br /> The rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes.<br /> <br /> Predictable session ids could allow an attacker to gain access to systems.<br /> <br /> Note that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-43500

Publication date:
11/05/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present<br /> <br /> The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE<br /> handler in rxrpc_verify_response() copy the skb to a linear one before<br /> calling into the security ops only when skb_cloned() is true. An skb<br /> that is not cloned but still carries externally-owned paged fragments<br /> (e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via<br /> __ip_append_data, or a chained skb_has_frag_list()) falls through to<br /> the in-place decryption path, which binds the frag pages directly into<br /> the AEAD/skcipher SGL via skb_to_sgvec().<br /> <br /> Extend the gate to also unshare when skb_has_frag_list() or<br /> skb_has_shared_frag() is true. This catches the splice-loopback vector<br /> and other externally-shared frag sources while preserving the<br /> zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC<br /> page_pool RX, GRO). The OOM/trace handling already in place is reused.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2026

CVE-2026-8276

Publication date:
11/05/2026
A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.
Severity CVSS v4.0: LOW
Last modification:
13/05/2026

CVE-2026-6433

Publication date:
11/05/2026
The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize user input before using it in a SQL query, and the result is passed to eval(), allowing unauthenticated users to execute arbitrary PHP code on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2026-8275

Publication date:
11/05/2026
A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
Severity CVSS v4.0: LOW
Last modification:
13/05/2026

CVE-2026-1677

Publication date:
11/05/2026
Zephyr sockets created with `IPPROTO_TLS_1_3` can still negotiate a TLS 1.2 connection when both TLS versions are enabled in Kconfig, because the socket-level protocol selection is not propagated to mbedTLS (e.g. via `mbedtls_ssl_conf_min_tls_version`). The ClientHello advertises both versions and the peer can establish TLS 1.2, so applications that assumed `IPPROTO_TLS_1_3` enforces TLS 1.3 may silently use TLS 1.2 and remain exposed to TLS 1.2-specific weaknesses. As a workaround, the `TLS_CIPHERSUITE_LIST` socket option can be restricted to TLS 1.3-only cipher suites.
Severity CVSS v4.0: Pending analysis
Last modification:
13/05/2026

CVE-2026-8273

Publication date:
11/05/2026
A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.
Severity CVSS v4.0: MEDIUM
Last modification:
11/05/2026

CVE-2026-8272

Publication date:
11/05/2026
A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Severity CVSS v4.0: LOW
Last modification:
11/05/2026