Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-8953

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability was fixed in Firefox 151, Firefox ESR 115.36, Firefox ESR 140.11, Thunderbird 151, and Thunderbird 140.11.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
19/05/2026

CVE-2026-8945

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Sandbox escape in Firefox and Firefox Focus for Android. This vulnerability was fixed in Firefox 151.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/05/2026

CVE-2026-8947

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability was fixed in Firefox 151, Firefox ESR 115.36, Firefox ESR 140.11, Thunderbird 151, and Thunderbird 140.11.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/05/2026

CVE-2026-8946

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 151, Firefox ESR 115.36, Firefox ESR 140.11, Thunderbird 151, and Thunderbird 140.11.
Gravedad CVSS v3.1: ALTA
Última modificación:
19/05/2026

CVE-2026-6354

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Rejected reason: Voluntarily withdrawn
Gravedad: Pendiente de análisis
Última modificación:
19/05/2026

CVE-2026-47323

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Camel-CXF and Camel-Knative Message Header Injection via Missing Inbound Filtering<br /> <br /> The CXF and Knative HeaderFilterStrategy implementations (CxfRsHeaderFilterStrategy in camel-cxf-rest, CxfHeaderFilterStrategy in camel-cxf-transport, and KnativeHttpHeaderFilterStrategy in camel-knative-http) only filter outbound Camel-internal headers via setOutFilterStartsWith, while not configuring inbound filtering via setInFilterStartsWith. As a result, an unauthenticated attacker can inject Camel-internal headers (e.g. CamelExecCommandExecutable, CamelFileName) via HTTP requests to CXF-RS or CXF-SOAP endpoints. When a route forwards messages from these endpoints to header-driven components such as camel-exec or camel-file, the injected headers override configured values, enabling remote code execution or arbitrary file writes. This is the same pattern that was previously addressed in camel-undertow (CVE-2025-30177), the broader incoming-header filter (CVE-2025-27636 and CVE-2025-29891), and non-HTTP strategies (CVE-2026-40453).<br /> <br /> <br /> This issue affects Apache Camel: from 3.18.0 before 4.14.6, from 4.15.0 before 4.18.2.<br /> <br /> Users are recommended to upgrade to version 4.19.0, which fixes the issue. If users are on the 4.18.x LTS releases stream, then they are suggested to upgrade to 4.18.2. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6.
Gravedad: Pendiente de análisis
Última modificación:
19/05/2026

CVE-2026-43633

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** HestiaCP versions 1.9.0 through 1.9.4 contain a deserialization vulnerability in the web terminal component caused by a session format mismatch between PHP and Node.js that allows unauthenticated remote attackers to achieve root-level code execution. Attackers can inject crafted data into HTTP headers that are processed by the PHP session handler but incorrectly deserialized by the Node.js web terminal component as trusted session values, resulting in arbitrary command execution on systems with the web terminal feature enabled.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
19/05/2026

CVE-2026-42100

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Handling of Syntactically Invalid Structure in Sparx Pro Cloud Server allows Denial of Service (DoS) attack to be executed by sending an specially crafted SQL query. This causes the Pro Cloud Server service to terminate unexpectedly. <br /> <br /> The vendor was notified early about this vulnerability, but didn&amp;#39;t respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/05/2026

CVE-2026-42096

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Sparx Pro Cloud Server is vulnerable to Broken Access Control within communication with the database. Due to lack of permission checks, any low privileged user can run arbitrary SQL queries within database user context.<br /> <br /> The vendor was notified early about this vulnerability, but didn&amp;#39;t respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/05/2026

CVE-2026-42097

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Sparx Pro Cloud Server requires authentication based on requested URL. An attacker can omit the "model" query parameter and send the model name only in the binary blob in POST request allowing SQL query execution without authentication.<br /> <br /> The vendor was notified early about this vulnerability, but didn&amp;#39;t respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
19/05/2026

CVE-2026-42098

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Sparx Enterprise Architect software has a security feature that limits user&amp;#39;s actions to those specified in the role. An authenticated attacker can modify the Enterprise Architect client behavior (e.g. using a debugger) and log in as any other user or administrator - then it is possible to do every possible change to the repository.<br /> <br /> The vendor was notified early about this vulnerability, but didn&amp;#39;t respond with the details of vulnerability or vulnerable version range. Only version 17.1 and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/05/2026

CVE-2026-42099

Fecha de publicación:
19/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Sparx Pro Cloud Server is vulnerable to a Race Condition in the /data_api/dl_internal_artifact.php endpoint. The application downloads the properties of the object pointed by guid parameter and saves loaded content in current location (__DIR__) under the specified name. An attacker with repository access can control both the filename and file contents, allowing the creation of a malicious PHP file in a current directory. Although the file is deleted after processing, a race condition exists: if the response transmission is delayed (e.g., via a large file or slow client connection), the file remains accessible. During this window, the attacker can issue a second request to execute the malicious PHP file, resulting in remote code execution.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> The vendor was notified early about this vulnerability, but didn&amp;#39;t respond with the details of vulnerability or vulnerable version range. Only version 6.1 (build 167) and below were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Gravedad CVSS v4.0: ALTA
Última modificación:
19/05/2026