Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-33537

Publication date:
26/03/2026
Lychee is a free, open-source photo-management tool. The patch introduced for GHSA-cpgw-wgf3-xc6v (SSRF via `Photo::fromUrl`) contains an incomplete IP validation check that fails to block loopback addresses and link-local addresses. Prior to version 7.5.1, an authenticated user can still reach internal services using direct IP addresses, bypassing all four protection configuration settings even when they are set to their secure defaults. Version 7.5.1 contains a fix for the issue.
Severity CVSS v4.0: MEDIUM
Last modification:
26/03/2026

CVE-2026-33541

Publication date:
26/03/2026
TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 34, a flaw in TSPortal allowed attackers to create arbitrary user records in the database by abusing validation logic. While validation correctly rejected invalid usernames, a side effect within a validation rule caused user records to be created regardless of whether the request succeeded. This could be exploited to cause uncontrolled database growth, leading to a potential denial of service (DoS). Version 34 contains a fix for the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-2100

Publication date:
26/03/2026
A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-2239

Publication date:
26/03/2026
A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-2271

Publication date:
26/03/2026
A flaw was found in GIMP's PSP (Paint Shop Pro) file parser. A remote attacker could exploit an integer overflow vulnerability in the read_creator_block() function by providing a specially crafted PSP image file. This vulnerability occurs when a 32-bit length value from the file is used for memory allocation without proper validation, leading to a heap overflow and an out-of-bounds write. Successful exploitation could result in an application level denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-2272

Publication date:
26/03/2026
A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises because a size calculation for image buffers can wrap around due to a 32-bit integer evaluation, allowing oversized image headers to bypass security checks. A remote attacker could exploit this by providing a specially crafted ICO file, leading to a buffer overflow and memory corruption, which may result in an application level denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-21724

Publication date:
26/03/2026
A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the required alert.notifications.receivers.protected:write permission.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-0968

Publication date:
26/03/2026
A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-0965

Publication date:
26/03/2026
A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-0964

Publication date:
26/03/2026
A malicious SCP server can send unexpected paths that could make the<br /> client application override local files outside of working directory.<br /> This could be misused to create malicious executable or configuration<br /> files and make the user execute them under specific consequences.<br /> <br /> This is the same issue as in OpenSSH, tracked as CVE-2019-6111.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-0966

Publication date:
26/03/2026
The API function `ssh_get_hexa()` is vulnerable, when 0-lenght<br /> input is provided to this function. This function is used internally<br /> in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated),<br /> which is vulnerable to the same input (length is provided by the<br /> calling application).<br /> <br /> The function is also used internally in the gssapi code for logging<br /> the OIDs received by the server during GSSAPI authentication. This<br /> could be triggered remotely, when the server allows GSSAPI authentication<br /> and logging verbosity is set at least to SSH_LOG_PACKET (3). This<br /> could cause self-DoS of the per-connection daemon process.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026

CVE-2026-0967

Publication date:
26/03/2026
A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.
Severity CVSS v4.0: Pending analysis
Last modification:
26/03/2026