Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-7835

Publication date:
21/05/2026
A format string argument mismatch in Netatalk 3.0.3 through 4.4.2 allows a remote authenticated attacker to cause a minor denial of service via crafted input that triggers incorrect format string processing.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-7836

Publication date:
21/05/2026
An incorrect calculation in the hextoint macro in Netatalk 2.0.0 through 4.4.2 due to improper uppercase character handling allows a remote authenticated attacker to cause limited data modification via crafted hexadecimal input.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-4055

Publication date:
21/05/2026
Mattermost versions 11.5.x
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44064

Publication date:
21/05/2026
An out-of-bounds read in ASP session ID handling in Netatalk 1.3 through 4.4.2 allows an adjacent network attacker to obtain limited information or cause a denial of service via a crafted ASP request.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44065

Publication date:
21/05/2026
An off-by-two error in lp_write() in papd in Netatalk 2.0.0 through 4.4.2 allows an adjacent network attacker to modify limited data or cause a minor service disruption via crafted print data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44066

Publication date:
21/05/2026
Multiple heap out-of-bounds reads in the Spotlight RPC unmarshalling code in Netatalk 3.1.0 through 4.4.2 allow a remote authenticated attacker to obtain sensitive information or cause a minor service disruption.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44067

Publication date:
21/05/2026
A heap over-read in extended attribute (EA) header parsing in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to obtain limited information or cause a minor service disruption via crafted EA data.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44068

Publication date:
21/05/2026
Incomplete sanitization of extended attribute (EA) path components in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to write to files outside the intended metadata namespace via crafted EA names.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44069

Publication date:
21/05/2026
An integer underflow in the volxlate function in Netatalk 3.0.0 through 4.4.2 allows a local privileged user to obtain limited information, modify limited data, or cause a minor service disruption via crafted volume translation input.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44070

Publication date:
21/05/2026
An unbounded memory reallocation in the charset conversion code in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to cause a minor denial of service via crafted character conversion requests.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44072

Publication date:
21/05/2026
Netatalk 2.2.1 through 4.4.2 calls system() after a failed chdir() without properly handling the error condition, which allows a local privileged user to execute unintended commands or cause a minor service disruption under specific conditions.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026

CVE-2026-44073

Publication date:
21/05/2026
Authentication modules in Netatalk 1.5.0 through 4.4.2 fail to check the return value of seteuid(), which may allow a remote authenticated attacker to retain elevated privileges under error conditions.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2026