Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-25110

Publication date:
19/05/2026
in OpenHarmony v6.0 and prior versions allow a local attacker cause DOS.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-25781

Publication date:
19/05/2026
in OpenHarmony v6.0 and prior versions allow a local attacker cause DOS and it cannot be recovered.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-25850

Publication date:
19/05/2026
in OpenHarmony v6.0 and prior versions allow a local attacker cause information leak
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-27648

Publication date:
19/05/2026
in OpenHarmony v6.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-27766

Publication date:
19/05/2026
in OpenHarmony v6.0 and prior versions allow a local attacker cause information leak.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-27781

Publication date:
19/05/2026
in OpenHarmony v6.0 and prior versions allow a local attacker cause DOS.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-24792

Publication date:
19/05/2026
in OpenHarmony v6.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-22069

Publication date:
19/05/2026
A local privilege escalation vulnerability exists in O+ Connect because it fails to validate the identity of the caller on the pipe interface.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-33514

Publication date:
19/05/2026
Discourse is an open-source discussion platform. In versions prior to 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1, an authenticated user on a Discourse instance with the form templates feature enabled can read the name and structured content of form templates that are intended exclusively for categories they are not authorized to access. Impact is limited to disclosure of site configuration metadata. This issue has been fixed in versions 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1.
Severity CVSS v4.0: MEDIUM
Last modification:
19/05/2026

CVE-2026-33234

Publication date:
19/05/2026
AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. In versions 0.1.0 through 0.6.51, SendEmailBlock in autogpt_platform/backend/backend/blocks/email_block.py accepts a user-supplied smtp_server (string) and smtp_port (integer) as per-execution block inputs, then passes them directly to Python's smtplib.SMTP() to open a raw TCP connection with no IP address validation. This completely bypasses the platform's hardened SSRF protections in backend/util/request.py — the validate_url_host() function and BLOCKED_IP_NETWORKS blocklist that every other block uses to block connections to private, loopback, link-local, and cloud metadata addresses. An authenticated user on a shared AutoGPT deployment can use this to perform non-blind internal network port scanning and service fingerprinting: smtplib reads the target's TCP banner on connect and embeds it in the exception message, which is persisted as user-visible block output via the execution framework. This issue has been fixed in version 0.6.52.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026

CVE-2026-33052

Publication date:
19/05/2026
Mantis Bug Tracker (MantisBT) is an open source issue tracker. Versions 2.28.0 and 2.28.1 allow a low-privileged authenticated user assigned the "add_profile_threshold" permission to create a global profile despite not having manage_global_profile_threshold, by tampering with the user_id parameter in a valid profile creation request. This issue has been fixed in version 2.28.2.
Severity CVSS v4.0: MEDIUM
Last modification:
19/05/2026

CVE-2026-33232

Publication date:
19/05/2026
AutoGPT is a workflow automation platform for creating, deploying, and managing continuous artificial intelligence agents. Versions 0.4.2 through 0.6.51 are vulnerable to an unauthenticated Denial of Service (DoS) through the server due to uncontrolled disk space consumption. The download_agent_file endpoint creates persistent temporary files for every request but fails to delete them after they are served. An unauthenticated attacker can repeatedly call this endpoint to exhaust the server&amp;#39;s disk space, causing<br /> the database or other system services to fail due to "No space left on device" errors, rendering the entire AutoGPT Platform backend unavailable to all users. This issue has been patched in version 0.6.52.
Severity CVSS v4.0: Pending analysis
Last modification:
19/05/2026