Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-24423

Publication date:
23/01/2026
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
Severity CVSS v4.0: CRITICAL
Last modification:
23/01/2026

CVE-2026-1299

Publication date:
23/01/2026
The <br /> email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when <br /> serializing an email message allowing for header injection when an email<br /> is serialized. This is only applicable if using "LiteralHeader" writing headers that don&amp;#39;t respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-71177

Publication date:
23/01/2026
LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rendered without proper output encoding in package search results. When other users view search results that include the malicious package, the injected script executes in their browsers, potentially enabling session hijacking, credential theft, and unauthorized actions in the context of the victim.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2025-67230

Publication date:
23/01/2026
Improper permissions in the handler for the Custom URL Scheme in ToDesktop Builder v0.33.0 allows attackers with renderer-context access to invoke external protocol handlers without sufficient validation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2021-47905

Publication date:
23/01/2026
MyBB Delete Account Plugin 1.4 contains a cross-site scripting vulnerability in the account deletion reason input field. Attackers can inject malicious scripts that will execute in the admin interface when viewing delete account reasons.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2021-47906

Publication date:
23/01/2026
BloofoxCMS 0.5.2.1 contains a stored cross-site scripting vulnerability in the articles text parameter that allows authenticated attackers to inject malicious scripts. Attackers can insert malicious javascript payloads in the text field to execute scripts and potentially steal authenticated users&amp;#39; cookies.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2021-47904

Publication date:
23/01/2026
PhreeBooks 5.2.3 contains an authenticated file upload vulnerability in the Image Manager that allows remote code execution. Attackers can upload a malicious PHP web shell by exploiting unrestricted file type uploads to gain command execution on the server.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2021-47899

Publication date:
23/01/2026
YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2021-47903

Publication date:
23/01/2026
LiteSpeed Web Server Enterprise 5.4.11 contains an authenticated command injection vulnerability in the external app configuration interface. Authenticated administrators can inject shell commands through the &amp;#39;Command&amp;#39; parameter in the server configuration, allowing remote code execution via path traversal and bash command injection.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2021-47897

Publication date:
23/01/2026
PEEL Shopping 9.3.0 contains a stored cross-site scripting vulnerability in the address parameter of the change_params.php script. Attackers can inject malicious JavaScript payloads that execute when users interact with the address text box, potentially enabling client-side script execution.
Severity CVSS v4.0: MEDIUM
Last modification:
23/01/2026

CVE-2021-47898

Publication date:
23/01/2026
Epson USB Display 1.6.0.0 contains an unquoted service path vulnerability in the EMP_UDSA service running with LocalSystem privileges. Attackers can exploit the unquoted path by placing malicious executables in intermediate directories to gain elevated system access.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026

CVE-2021-47896

Publication date:
23/01/2026
PDF Complete Corporate Edition 4.1.45 contains an unquoted service path vulnerability in the pdfcDispatcher service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in the service binary location to inject malicious executables that will be run with elevated LocalSystem privileges.
Severity CVSS v4.0: HIGH
Last modification:
23/01/2026