Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-33815

Publication date:
07/04/2026
Memory-safety vulnerability in github.com/jackc/pgx/v5.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2026-33816

Publication date:
07/04/2026
Memory-safety vulnerability in github.com/jackc/pgx/v5.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2025-52908

Publication date:
07/04/2026
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Incorrect Handling of the NL80211 vendor command leads to a buffer overflow via a certain ioctl message, issue 1 of 2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2026-1078

Publication date:
07/04/2026
An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pega Robotic Automation version 22.1 or R25 users who are running automations that work with Google Chrome or Microsoft Edge. A bad actor could create a website that includes malicious code. The vulnerability could occur if a Robot Runtime user navigates to the malicious website.
Severity CVSS v4.0: HIGH
Last modification:
07/04/2026

CVE-2026-1079

Publication date:
07/04/2026
A native messaging host vulnerability in Pega Browser Extension (PBE) affects users of all versions of Pega Robotic Automation who have installed Pega Browser Extension. A bad actor could create a website that contains malicious code that targets PBE. The vulnerability could occur if a user navigates to this website. The malicious website could then present an unexpected message box.
Severity CVSS v4.0: MEDIUM
Last modification:
07/04/2026

CVE-2026-30460

Publication date:
07/04/2026
Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability in the Blocks module.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2025-24817

Publication date:
07/04/2026
Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to improper neutralization of special elements used in an OS command in Symptom Collector application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2025-24819

Publication date:
07/04/2026
Nokia MantaRay NM is vulnerable to a Relative Path Traversal vulnerability due to improper validation of input parameter on the file system in Software Manager application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2025-24818

Publication date:
07/04/2026
Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to improper neutralization of special elements used in an OS command in Log Search application.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2024-36057

Publication date:
07/04/2026
Koha Library before 23.05.10 fails to sanitize user-controllable filenames prior to unzipping, leading to remote code execution. The line "qx/unzip $filename -d $dirname/;" in upload-cover-image.pl is vulnerable to command injection via shell metacharacters because input data can be controlled by an attacker and is directly included in a system command, i.e., an attack can occur via malicious filenames after uploading a .zip file and clicking Process Images.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2026-5380

Publication date:
07/04/2026
An issue that could allow an authorized user to view the clear-text secrets for a subset of credential types and fields has been resolved. This is an instance of CWE-522: Insufficiently Protected Credentials, and has an estimated CVSS score of<br /> CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N (5.3 Medium). This issue was fixed in version 4.0.260204.2 of the runZero Platform.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026

CVE-2026-5381

Publication date:
07/04/2026
An issue that could expose task information outside of the authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N (2.2 Low). This issue was fixed in version 4.0.260205.0 of the runZero Platform.
Severity CVSS v4.0: Pending analysis
Last modification:
07/04/2026