Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-34477

Publication date:
10/04/2026
The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the element.<br /> <br /> Although the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.<br /> <br /> A network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:<br /> <br /> * An SMTP, Socket, or Syslog appender is in use.<br /> * TLS is configured via a nested element.<br /> * The attacker can present a certificate issued by a CA trusted by the appender&amp;#39;s configured trust store, or by the default Java trust store if none is configured.<br /> This issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.<br /> <br /> Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
10/04/2026

CVE-2026-36235

Publication date:
10/04/2026
A SQL injection vulnerability was found in the scheduleSubList.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that the &amp;#39;subjcode&amp;#39; parameter is directly embedded into the SQL query via string interpolation without any sanitization or validation.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-36236

Publication date:
10/04/2026
SourceCodester Engineers Online Portal v1.0 is vulnerable to SQL Injection in update_password.php via the new_password parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-36232

Publication date:
10/04/2026
A SQL injection vulnerability was found in the instructorClasses.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that the &amp;#39;classId&amp;#39; parameter from $_GET[&amp;#39;classId&amp;#39;] is directly concatenated into the SQL query without any sanitization or validation.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-36233

Publication date:
10/04/2026
A SQL injection vulnerability was found in the assignInstructorSubjects.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that attackers can inject malicious code via the parameter "subjcode" and use it directly in SQL queries without the need for appropriate cleaning or validation.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-36234

Publication date:
10/04/2026
itsourcecode Online Student Enrollment System v1.0 is vulnerable to SQL Injection in newCourse.php via the &amp;#39;coursename&amp;#39; parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-23780

Publication date:
10/04/2026
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A SQL injection vulnerability in the MFT API&amp;#39;s debug interface allows an authenticated attacker to inject malicious queries due to improper input validation and unsafe dynamic SQL handling. Successful exploitation can enable arbitrary file read/write operations and potentially lead to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-23782

Publication date:
10/04/2026
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API management endpoint allows unauthenticated users to obtain both an API identifier and its corresponding secret value. With these exposed secrets, an attacker could invoke privileged API operations, potentially leading to unauthorized access.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-29861

Publication date:
10/04/2026
PHP-MYSQL-User-Login-System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter at login.php.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-31262

Publication date:
10/04/2026
Cross Site Scripting vulnerability in Altenar Sportsbook Software Platform (SB2) v.2.0 allows a remote attacker to obtain sensitive information and execute arbitrary code via the URL parameter
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2025-44560

Publication date:
10/04/2026
owntone-server 2ca10d9 is vulnerable to Buffer Overflow due to lack of recursive checking.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026

CVE-2026-6069

Publication date:
10/04/2026
NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2026