Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-27568

Publication date:
24/02/2026
WWBN AVideo is an open source video platform. Prior to version 21.0, AVideo allows Markdown in video comments and uses Parsedown (v1.7.4) without Safe Mode enabled. Markdown links are not sufficiently sanitized, allowing `javascript:` URIs to be rendered as clickable links. An authenticated low-privilege attacker can post a malicious comment that injects persistent JavaScript. When another user clicks the link, the attacker can perform actions such as session hijacking, privilege escalation (including admin takeover), and data exfiltration. Version 21.0 contains a fix. As a workaround, validate and block unsafe URI schemes (e.g., `javascript:`) before rendering Markdown, and enable Parsedown Safe Mode.
Severity CVSS v4.0: MEDIUM
Last modification:
26/02/2026

CVE-2026-0400

Publication date:
24/02/2026
A post-authentication Format String vulnerability in SonicOS allows a remote attacker to crash a firewall.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2026-0401

Publication date:
24/02/2026
A post-authentication NULL Pointer Dereference vulnerability in SonicOS allows a remote attacker to crash a firewall.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2026-0402

Publication date:
24/02/2026
A post-authentication Out-of-bounds Read vulnerability in SonicOS allows a remote attacker to crash a firewall.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2026-27208

Publication date:
24/02/2026
bleon-ethical/api-gateway-deploy provides API gateway deployment. Version 1.0.0 is vulnerable to an attack chain involving OS Command Injection and Privilege Escalation. This allows an attacker to execute arbitrary commands with root privileges within the container, potentially leading to a container escape and unauthorized infrastructure modifications. This is fixed in version 1.0.1 by implementing strict input sanitization and secure delimiters in entrypoint.sh, enforcing a non-root user (appuser) in the Dockerfile, and establishing mandatory security quality gates.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2025-67445

Publication date:
24/02/2026
TOTOLINK X5000R V9.1.0cu.2415_B20250515 contains a denial-of-service vulnerability in /cgi-bin/cstecgi.cgi. The CGI reads the CONTENT_LENGTH environment variable and allocates memory using malloc (CONTENT_LENGTH + 1) without sufficient bounds checking. When lighttpd s request size limit is not enforced, a crafted large POST request can cause memory exhaustion or a segmentation fault, leading to a crash of the management CGI and loss of availability of the web interface.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-0399

Publication date:
24/02/2026
Multiple post-authentication stack-based buffer overflow vulnerabilities in the SonicOS management interface due to improper bounds checking in a API endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026

CVE-2025-10010

Publication date:
24/02/2026
The CPSD CryptoPro Secure Disk application boots a small Linux operating system to perform user authentication before using BitLocker to decrypt the Windows partition. The system is located on a separate unencrypted partition which can be reached by anyone with access to the hard disk.<br /> <br /> Multiple checks are performed to validate the integrity of the Linux operating system and the CryptoPro Secure Disk application files. When files are changed an error is shown on system start. One of the checks is the Linux kernel&amp;#39;s Integrity Measurement Architecture (IMA). It was identified that configuration files are not validated by the IMA and can then (if not checked by other measures) be changed. This allows an attacker to execute arbitrary code in the context of the root user and enables an attacker to e.g., plant a backdoor and access data during execution.
Severity CVSS v4.0: Pending analysis
Last modification:
13/03/2026

CVE-2026-2805

Publication date:
24/02/2026
Invalid pointer in the DOM: Core &amp; HTML component. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2026

CVE-2026-2806

Publication date:
24/02/2026
Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2026

CVE-2026-2807

Publication date:
24/02/2026
Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2026

CVE-2026-2795

Publication date:
24/02/2026
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2026