Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-2464

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment.
Gravedad CVSS v4.0: ALTA
Última modificación:
18/02/2026

CVE-2026-2654

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A weakness has been identified in huggingface smolagents 1.24.0. Impacted is the function requests.get/requests.post of the component LocalPythonExecutor. Executing a manipulation can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2026-1438

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/system/nodes/' endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2026-1439

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim&amp;#39;s browser and limited manipulation of the affected user&amp;#39;s session context, through the  &amp;#39;/<br /> <br /> alerts<br /> <br /> /&amp;#39; endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2026-1440

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim&amp;#39;s browser and limited manipulation of the affected user&amp;#39;s session context, through the  &amp;#39;/system/pipelines/&amp;#39; endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2026-1441

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim&amp;#39;s browser and limited manipulation of the affected user&amp;#39;s session context, through the  &amp;#39;/system/index_sets/&amp;#39; endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2025-8308

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Neutralization of Input During Web Page Generation (XSS or &amp;#39;Cross-site Scripting&amp;#39;) vulnerability in Key Software Solutions Inc. INFOREX- General Information Management System allows XSS Through HTTP Headers.This issue affects INFOREX- General Information Management System: from 2025 and before through 18022026.<br /> <br /> NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v3.1: MEDIA
Última modificación:
18/02/2026

CVE-2026-1435

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new &amp;#39;sessionId&amp;#39; each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked &amp;#39;sessionId&amp;#39; can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
18/02/2026

CVE-2026-1436

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user&amp;#39;s profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint &amp;#39;http://:12900/users/&amp;#39; does not implement object-level authorization validations.
Gravedad CVSS v4.0: ALTA
Última modificación:
18/02/2026

CVE-2026-1437

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim&amp;#39;s browser and limited manipulation of the affected user&amp;#39;s session context, through the &amp;#39;/system/authentication/users/edit/&amp;#39; endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2025-33252

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
Gravedad CVSS v3.1: ALTA
Última modificación:
18/02/2026

CVE-2025-33253

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
Gravedad CVSS v3.1: ALTA
Última modificación:
18/02/2026