Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-37103

Publication date:
03/02/2026
DotNetNuke 9.5 contains a persistent cross-site scripting vulnerability that allows normal users to upload malicious XML files with executable scripts through journal tools. Attackers can upload XML files with XHTML namespace scripts to execute arbitrary JavaScript in users' browsers, potentially bypassing CSRF protections and performing more damaging attacks.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2020-37105

Publication date:
03/02/2026
PMB 5.6 contains a SQL injection vulnerability in the administration download script that allows authenticated attackers to execute arbitrary SQL commands through the 'logid' parameter. Attackers can leverage this vulnerability by sending crafted requests to the /admin/sauvegarde/download.php endpoint with manipulated logid values to interact with the database.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026

CVE-2020-37108

Publication date:
03/02/2026
PhpIX 2012 Professional contains a SQL injection vulnerability in the 'id' parameter of product_detail.php that allows remote attackers to manipulate database queries. Attackers can inject malicious SQL code through the 'id' parameter to potentially extract or modify database information.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026

CVE-2019-25263

Publication date:
03/02/2026
Zendesk SweetHawk Survey 1.6 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts through support ticket submissions. Attackers can insert XSS payloads like script tags into ticket text that automatically execute when survey pages are loaded by other users.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2019-25264

Publication date:
03/02/2026
Snipe-IT 4.7.5 contains a persistent cross-site scripting vulnerability that allows authorized users to upload malicious SVG files with embedded JavaScript. Attackers can craft SVG files with script tags to execute arbitrary JavaScript when the accessory is viewed by other users.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2026-1568

Publication date:
03/02/2026
Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup<br /> via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies that granted access to the<br /> targeted user accounts. This has been fixed in version 8.34.0 of InsightVM.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-24762

Publication date:
03/02/2026
RustFS is a distributed object storage system built in Rust. From versions alpha.13 to alpha.81, RustFS logs sensitive credential material (access key, secret key, session token) to application logs at INFO level. This results in credentials being recorded in plaintext in log output, which may be accessible to internal or external log consumers and could lead to compromise of sensitive credentials. This issue has been patched in version alpha.82.
Severity CVSS v4.0: MEDIUM
Last modification:
03/02/2026

CVE-2026-23794

Publication date:
03/02/2026
Reflected XSS in Apache Syncope&amp;#39;s Enduser Login page.<br /> An attacker that tricks a legitimate user into clicking a malicious link and logging in to Syncope Enduser could steal that user&amp;#39;s credentials.<br /> <br /> This issue affects Apache Syncope: from 3.0 through 3.0.15, from 4.0 through 4.0.3.<br /> <br /> Users are recommended to upgrade to version 3.0.16 / 4.0.4, which fix this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-23795

Publication date:
03/02/2026
Improper Restriction of XML External Entity Reference vulnerability in Apache Syncope Console.<br /> An administrator with adequate entitlements to create or edit Keymaster parameters via Console can construct malicious XML text to launch an XXE attack, thereby causing sensitive data leakage occurs.<br /> <br /> This issue affects Apache Syncope: from 3.0 through 3.0.15, from 4.0 through 4.0.3.<br /> <br /> Users are recommended to upgrade to version 3.0.16 / 4.0.4, which fix this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-21862

Publication date:
03/02/2026
RustFS is a distributed object storage system built in Rust. Prior to version alpha.78, IP-based access control can be bypassed: get_condition_values trusts client-supplied X-Forwarded-For/X-Real-Ip without verifying a trusted proxy, so any reachable client can spoof aws:SourceIp and satisfy IP-allowlist policies. This issue has been patched in version alpha.78.
Severity CVSS v4.0: HIGH
Last modification:
03/02/2026

CVE-2026-25027

Publication date:
03/02/2026
Improper Control of Filename for Include/Require Statement in PHP Program (&amp;#39;PHP Remote File Inclusion&amp;#39;) vulnerability in ThemeMove Unicamp unicamp allows PHP Local File Inclusion.This issue affects Unicamp: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026

CVE-2026-25028

Publication date:
03/02/2026
Missing Authorization vulnerability in Element Invader ElementInvader Addons for Elementor elementinvader-addons-for-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ElementInvader Addons for Elementor: from n/a through
Severity CVSS v4.0: Pending analysis
Last modification:
03/02/2026