Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-25890

Publication date:
09/02/2026
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, an authenticated user can bypass the application's "Disallow" file path rules by modifying the request URL. By adding multiple slashes (e.g., //private/) to the path, the authorization check fails to match the rule, while the underlying filesystem resolves the path correctly, granting unauthorized access to restricted files. This vulnerability is fixed in 2.57.1.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2026

CVE-2026-25807

Publication date:
09/02/2026
ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure complex environments. Prior to 9.0.3, the P2P terminal sharing feature (share start) opens a TCP socket on port 5757 without any authentication mechanism. Any remote attacker can connect to this port using a simple socket script. An attacker who connects to a ZAI-Shell P2P session running in --no-ai mode can send arbitrary system commands. If the host user approves the command without reviewing its contents, the command executes directly with the user's privileges, bypassing all Sentinel safety checks. This vulnerability is fixed in 9.0.3.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2026

CVE-2026-25808

Publication date:
09/02/2026
Hollo is a federated single-user microblogging software designed to be federated through ActivityPub. Prior to 0.6.20 and 0.7.2, there is a security vulnerability where DMs and followers-only posts were exposed through the ActivityPub outbox endpoint without authorization. This vulnerability is fixed in 0.6.20 and 0.7.2.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2026

CVE-2026-25811

Publication date:
09/02/2026
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the application derives the tenant identifier directly from the email domain provided by the user, without validating domain ownership or registration. This allows cross-tenant data access.
Severity CVSS v4.0: MEDIUM
Last modification:
09/02/2026

CVE-2026-25812

Publication date:
09/02/2026
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the application enables credentialed CORS requests but does not implement any CSRF protection mechanism.
Severity CVSS v4.0: CRITICAL
Last modification:
09/02/2026

CVE-2026-25813

Publication date:
09/02/2026
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, The application logs highly sensitive data directly to console output without masking or redaction.
Severity CVSS v4.0: HIGH
Last modification:
09/02/2026

CVE-2025-15315

Publication date:
09/02/2026
Tanium addressed a local privilege escalation vulnerability in Tanium Module Server.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2026

CVE-2025-15316

Publication date:
09/02/2026
Tanium addressed a local privilege escalation vulnerability in Tanium Server.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2026

CVE-2025-15317

Publication date:
09/02/2026
Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Server.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2026

CVE-2026-25810

Publication date:
09/02/2026
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the backend/src/routes/student.submission.routes.ts verify authentication but fails to enforce object-level authorization (ownership checks).
Severity CVSS v4.0: MEDIUM
Last modification:
09/02/2026

CVE-2026-25876

Publication date:
09/02/2026
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, the backend/src/routes/results.routes.ts verify authentication but fails to enforce object-level authorization (ownership checks). For example, this can be used to return all results for an assessment.
Severity CVSS v4.0: MEDIUM
Last modification:
09/02/2026

CVE-2026-25878

Publication date:
09/02/2026
FroshAdminer is the Adminer plugin for Shopware Platform. Prior to 2.2.1, the Adminer route (/admin/adminer) was accessible without Shopware admin authentication. The route was configured with auth_required=false and performed no session validation, exposing the Adminer UI to unauthenticated users. This vulnerability is fixed in 2.2.1.
Severity CVSS v4.0: MEDIUM
Last modification:
09/02/2026