Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-24738

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** gmrtd is a Go library for reading Machine Readable Travel Documents (MRTDs). Prior to version 0.17.2, ReadFile accepts TLVs with lengths that can range up to 4GB, which can cause unconstrained resource consumption in both memory and cpu cycles. ReadFile can consume an extended TLV with lengths well outside what would be available in ICs. It can accept something all the way up to 4GB which would take too many iterations in 256 byte chunks, and would also try to allocate memory that might not be available in constrained environments like phones. Or if an API sends data to ReadFile, the same problem applies. The very small chunked read also locks the goroutine in accepting data for a very large number of iterations. projects using the gmrtd library to read files from NFCs can experience extreme slowdowns or memory consumption. A malicious NFC can just behave like the mock transceiver described above and by just sending dummy bytes as each chunk to be read, can make the receiving thread unresponsive and fill up memory on the host system. Version 0.17.2 patches the issue.
Gravedad CVSS v4.0: MEDIA
Última modificación:
27/01/2026

CVE-2026-24740

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
Gravedad CVSS v4.0: ALTA
Última modificación:
27/01/2026

CVE-2026-24736

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook configuration does not appear to validate or restrict destination IP addresses. It accepts local addresses such as 127.0.0.1 or localhost. When a rule is triggered (Either manual trigger by manually calling the trigger endpoint or by a content update or any other triggers), the backend server executes an HTTP request to the user-supplied URL. Crucially, the server logs the full HTTP response in the rule execution log (lastDump field), which is accessible via the API. Which turns a "Blind" SSRF into a "Full Read" SSRF. As of time of publication, no patched versions are available.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
27/01/2026

CVE-2026-1504

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
Gravedad CVSS v3.1: MEDIA
Última modificación:
27/01/2026

CVE-2025-21589

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** An Authentication Bypass Using an<br /> Alternate Path or Channel vulnerability in Juniper Networks Session Smart<br /> Router may allows a network-based attacker to bypass authentication<br /> and take administrative control of the device.<br /> <br /> This issue affects Session Smart Router: <br /> <br /> <br /> <br /> * from 5.6.7 before 5.6.17, <br /> * from 6.0 before 6.0.8 (affected from 6.0.8),<br /> <br /> * from 6.1 before 6.1.12-lts, <br /> * from 6.2 before 6.2.8-lts, <br /> * from 6.3 before 6.3.3-r2; <br /> <br /> <br /> <br /> <br /> This issue affects Session Smart Conductor: <br /> <br /> <br /> <br /> * from 5.6.7 before 5.6.17, <br /> * from 6.0 before 6.0.8 (affected from 6.0.8),<br /> <br /> * from 6.1 before 6.1.12-lts, <br /> * from 6.2 before 6.2.8-lts, <br /> * from 6.3 before 6.3.3-r2; <br /> <br /> <br /> <br /> <br /> This issue affects WAN Assurance Managed Routers: <br /> <br /> <br /> <br /> * from 5.6.7 before 5.6.17, <br /> * from 6.0 before 6.0.8 (affected from 6.0.8),<br /> <br /> * from 6.1 before 6.1.12-lts, <br /> * from 6.2 before 6.2.8-lts, <br /> * from 6.3 before 6.3.3-r2.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
27/01/2026

CVE-2026-24858

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
28/01/2026

CVE-2026-24688

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** pypdf is a free and open-source pure-python PDF library. An attacker who uses an infinite loop vulnerability that is present in versions prior to 6.6.2 can craft a PDF which leads to an infinite loop. This requires accessing the outlines/bookmarks. This has been fixed in pypdf 6.6.2. If projects cannot upgrade yet, consider applying the changes from PR #3610 manually.
Gravedad CVSS v4.0: MEDIA
Última modificación:
27/01/2026

CVE-2026-24771

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, a Cross-Site Scripting (XSS) vulnerability exists in the `ErrorBoundary` component of the hono/jsx library. Under certain usage patterns, untrusted user-controlled strings may be rendered as raw HTML, allowing arbitrary script execution in the victim&amp;#39;s browser. Version 4.11.7 patches the issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
27/01/2026

CVE-2026-24473

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Serve static Middleware for the Cloudflare Workers adapter contains an information disclosure vulnerability that may allow attackers to read arbitrary keys from the Workers environment. Improper validation of user-controlled paths can result in unintended access to internal asset keys. Version 4.11.7 contains a patch for the issue.
Gravedad CVSS v4.0: MEDIA
Última modificación:
27/01/2026

CVE-2026-24472

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Cache Middleware contains an information disclosure vulnerability caused by improper handling of HTTP cache control directives. The middleware does not respect standard cache control headers such as `Cache-Control: private` or `Cache-Control: no-store`, which may result in private or authenticated responses being cached and subsequently exposed to unauthorized users. Version 4.11.7 has a patch for the issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
27/01/2026

CVE-2025-12810

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation modules).This issue affects Secret Server On-Prem: 11.8.1, 11.9.6, 11.9.25.<br /> <br /> A secret with "change password on check in" enabled automatically checks in even when the password change fails after reaching its retry limit. This leaves the secret in an inconsistent state with the wrong password.<br /> <br /> Remediation: Upgrade to 11.9.47 or later. The secret will remain checked out when the password change fails.
Gravedad CVSS v4.0: MEDIA
Última modificación:
27/01/2026

CVE-2025-14988

Fecha de publicación:
27/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security issue has been identified in ibaPDA that could allow unauthorized actions on the file system under certain conditions. This may impact the confidentiality, integrity, or availability of the system.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
27/01/2026