Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-24070

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** During the installation of the Native Access application, a privileged helper `com.native-instruments.NativeAccess.Helper2`, which is used by Native Access to trigger functions via XPC communication like copy-file, remove or set-permissions, is deployed as well. The communication with the XPC service of the privileged helper is only allowed if the client process is signed with the corresponding certificate and fulfills the following code signing requirement:<br /> "anchor trusted and certificate leaf[subject.CN] = \"Developer ID Application: Native Instruments GmbH (83K5EG6Z9V)\""<br /> <br /> The Native Access application was found to be signed with the `com.apple.security.cs.allow-dyld-environment-variables` and `com.apple.security.cs.disable-library-validation` entitlements leading to DYLIB injection and therefore command execution in the context of this application. A low privileged user can exploit the DYLIB injection to trigger functions of the privileged helper XPC service resulting in privilege escalation by first deleting the /etc/sudoers file and then copying a malicious version of that file to /etc/sudoers.
Gravedad: Pendiente de análisis
Última modificación:
02/02/2026

CVE-2026-24071

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID reuse attacks.
Gravedad: Pendiente de análisis
Última modificación:
02/02/2026

CVE-2026-1186

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** EAP Legislator is vulnerable to Path Traversal in file extraction functionality. Attacker can prepare zipx archive (default file type used by the Legislator application) and choose arbitrary path outside the intended directory (e.x. system startup) where files will be extracted by the victim upon opening the file.<br /> This issue was fixed in version 2.25a.
Gravedad CVSS v4.0: ALTA
Última modificación:
02/02/2026

CVE-2026-1760

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated client can exploit this by sending specially crafted requests, causing SoupServer to fail to close the connection as required by RFC 9112. This allows the attacker to smuggle additional requests over the persistent connection, leading to unintended request processing and potential denial-of-service (DoS) conditions.
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/02/2026

CVE-2026-1761

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
Gravedad CVSS v3.1: ALTA
Última modificación:
02/02/2026

CVE-2025-8587

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Neutralization of Special Elements used in an SQL Command (&amp;#39;SQL Injection&amp;#39;) vulnerability in AKCE Software Technology R&amp;D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.
Gravedad CVSS v3.1: ALTA
Última modificación:
02/02/2026

CVE-2026-1757

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/02/2026

CVE-2025-6208

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** The `SimpleDirectoryReader` component in `llama_index.core` version 0.12.23 suffers from uncontrolled memory consumption due to a resource management flaw. The vulnerability arises because the user-specified file limit (`num_files_limit`) is applied after all files in a directory are loaded into memory. This can lead to memory exhaustion and degraded performance, particularly in environments with limited resources. The issue is resolved in version 0.12.41.
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/02/2026

CVE-2025-7105

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in danny-avila/librechat allows attackers to exploit the unrestricted Fork Function in `/api/convos/fork` to fork numerous contents rapidly. If the forked content includes a Mermaid graph with a large number of nodes, it can lead to a JavaScript heap out of memory error upon service restart, causing a denial of service. This issue affects the latest version of the product.
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/02/2026

CVE-2026-0599

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can lead to resource exhaustion, including network bandwidth saturation, memory inflation, and CPU overutilization. The vulnerability is triggered even if the request is later rejected for exceeding token limits. The default deployment configuration, which lacks memory usage limits and authentication, exacerbates the impact, potentially crashing the host machine. The issue is resolved in version 3.3.7.
Gravedad CVSS v3.1: ALTA
Última modificación:
02/02/2026

CVE-2024-4147

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to delete prompts created in other organizations through ID manipulation. The vulnerability stems from the application&amp;#39;s failure to validate the ownership of the prompt before deletion, only checking if the user has permissions to delete such resources without verifying if it belongs to the user&amp;#39;s project or organization. As a result, users can remove prompts not owned by their organization or project, leading to legitimate users being unable to access the removed prompts and causing information inconsistencies.
Gravedad CVSS v3.1: ALTA
Última modificación:
02/02/2026

CVE-2024-5386

Fecha de publicación:
02/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** In lunary-ai/lunary version 1.2.2, an account hijacking vulnerability exists due to a password reset token leak. A user with a &amp;#39;viewer&amp;#39; role can exploit this vulnerability to hijack another user&amp;#39;s account by obtaining the password reset token. The vulnerability is triggered when the &amp;#39;viewer&amp;#39; role user sends a specific request to the server, which responds with a password reset token in the &amp;#39;recoveryToken&amp;#39; parameter. This token can then be used to reset the password of another user&amp;#39;s account without authorization. The issue results from an excessive attack surface, allowing lower-privileged users to escalate their privileges and take over accounts.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
02/02/2026