Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-35568

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to 1.0.0, the java-sdk contains a DNS rebinding vulnerability. This vulnerability allows an attacker to access a locally or network-private java-sdk MCP server via a victims browser that is either local, or network adjacent. This allows an attacker to make any tool call to the server as if they were a locally running MCP connected AI agent. This vulnerability is fixed in 1.0.0.
Gravedad CVSS v4.0: ALTA
Última modificación:
08/04/2026

CVE-2026-39933

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - GlobalWatchlist Extension allows Cross-Site Scripting (XSS). The issue has been remediated on the `master` branch, and in the release branches for MediaWiki versions 1.43, 1.44, and 1.45.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/04/2026

CVE-2026-34371

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** LibreChat is a ChatGPT clone with additional features. Prior to 0.8.4, LibreChat trusts the name field returned by the execute_code sandbox when persisting code-generated artifacts. On deployments using the default local file strategy, a malicious artifact filename containing traversal sequences (for example, ../../../../../app/client/dist/poc.txt) is concatenated into the server-side destination path and written with fs.writeFileSync() without sanitization. This gives any user who can trigger execute_code an arbitrary file write primitive as the LibreChat server user. This vulnerability is fixed in 0.8.4.
Gravedad CVSS v3.1: MEDIA
Última modificación:
08/04/2026

CVE-2026-34580

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Botan is a C++ cryptography library. In 3.11.0, the function Certificate_Store::certificate_known had a misleading name; it would return true if any certificate in the store had a DN (and subject key identifier, if set) matching that of the argument. It did not check that the cert it found and the cert it was passed were actually the same certificate. In 3.11.0 an extension of path validation logic was made which assumed that certificate_known only returned true if the certificates were in fact identical. The impact is that if an end entity certificate is presented, and its DN (and subject key identifier, if set) match that of any trusted root, the end entity certificate is accepted immediately as if it itself were a trusted root. , This vulnerability is fixed in 3.11.1.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
08/04/2026

CVE-2026-34582

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Botan is a C++ cryptography library. Prior to version 3.11.1, the TLS 1.3 implementation allowed ApplicationData records to be processed prior to the Finished message being received. A server which is attempting to enforce client authentication via certificates can by bypassed by a client which entirely omits Certificate, CertificateVerify, and the Finished message and instead sends application data records. This vulnerability is fixed in 3.11.1.
Gravedad CVSS v4.0: ALTA
Última modificación:
08/04/2026

CVE-2026-34765

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, when a renderer calls window.open() with a target name, Electron did not correctly scope the named-window lookup to the opener's browsing context group. A renderer could navigate an existing child window that was opened by a different, unrelated renderer if both used the same target name. If that existing child was created with more permissive webPreferences (via setWindowOpenHandler's overrideBrowserWindowOptions), content loaded by the second renderer inherits those permissions. Apps are only affected if they open multiple top-level windows with differing trust levels and use setWindowOpenHandler to grant child windows elevated webPreferences such as a privileged preload script. Apps that do not elevate child window privileges, or that use a single top-level window, are not affected. Apps that additionally grant nodeIntegration: true or sandbox: false to child windows (contrary to the security recommendations) may be exposed to arbitrary code execution. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5.
Gravedad CVSS v3.1: MEDIA
Última modificación:
08/04/2026

CVE-2026-34079

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the caching for ld.so removes outdated cache files without properly checking that the app controlled path to the outdated cache is in the cache directory. This allows Flatpak apps to delete arbitrary files on the host. This vulnerability is fixed in 1.16.4.
Gravedad CVSS v4.0: ALTA
Última modificación:
10/04/2026

CVE-2026-31789

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Issue summary: Converting an excessively large OCTET STRING value to<br /> a hexadecimal string leads to a heap buffer overflow on 32 bit platforms.<br /> <br /> Impact summary: A heap buffer overflow may lead to a crash or possibly<br /> an attacker controlled code execution or other undefined behavior.<br /> <br /> If an attacker can supply a crafted X.509 certificate with an excessively<br /> large OCTET STRING value in extensions such as the Subject Key Identifier<br /> (SKID) or Authority Key Identifier (AKID) which are being converted to hex,<br /> the size of the buffer needed for the result is calculated as multiplication<br /> of the input length by 3. On 32 bit platforms, this multiplication may overflow<br /> resulting in the allocation of a smaller buffer and a heap buffer overflow.<br /> <br /> Applications and services that print or log contents of untrusted X.509<br /> certificates are vulnerable to this issue. As the certificates would have<br /> to have sizes of over 1 Gigabyte, printing or logging such certificates<br /> is a fairly unlikely operation and only 32 bit platforms are affected,<br /> this issue was assigned Low severity.<br /> <br /> The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this<br /> issue, as the affected code is outside the OpenSSL FIPS module boundary.
Gravedad: Pendiente de análisis
Última modificación:
08/04/2026

CVE-2026-31790

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Issue summary: Applications using RSASVE key encapsulation to establish<br /> a secret encryption key can send contents of an uninitialized memory buffer to<br /> a malicious peer.<br /> <br /> Impact summary: The uninitialized buffer might contain sensitive data from the<br /> previous execution of the application process which leads to sensitive data<br /> leakage to an attacker.<br /> <br /> RSA_public_encrypt() returns the number of bytes written on success and -1<br /> on error. The affected code tests only whether the return value is non-zero.<br /> As a result, if RSA encryption fails, encapsulation can still return success to<br /> the caller, set the output lengths, and leave the caller to use the contents of<br /> the ciphertext buffer as if a valid KEM ciphertext had been produced.<br /> <br /> If applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an<br /> attacker-supplied invalid RSA public key without first validating that key,<br /> then this may cause stale or uninitialized contents of the caller-provided<br /> ciphertext buffer to be disclosed to the attacker in place of the KEM<br /> ciphertext.<br /> <br /> As a workaround calling EVP_PKEY_public_check() or<br /> EVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate<br /> the issue.<br /> <br /> The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
08/04/2026

CVE-2026-28389

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Issue summary: During processing of a crafted CMS EnvelopedData message<br /> with KeyAgreeRecipientInfo a NULL pointer dereference can happen.<br /> <br /> Impact summary: Applications that process attacker-controlled CMS data may<br /> crash before authentication or cryptographic operations occur resulting in<br /> Denial of Service.<br /> <br /> When a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is<br /> processed, the optional parameters field of KeyEncryptionAlgorithmIdentifier<br /> is examined without checking for its presence. This results in a NULL<br /> pointer dereference if the field is missing.<br /> <br /> Applications and services that call CMS_decrypt() on untrusted input<br /> (e.g., S/MIME processing or CMS-based protocols) are vulnerable.<br /> <br /> The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this<br /> issue, as the affected code is outside the OpenSSL FIPS module boundary.
Gravedad CVSS v3.1: ALTA
Última modificación:
10/04/2026

CVE-2026-28390

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Issue summary: During processing of a crafted CMS EnvelopedData message<br /> with KeyTransportRecipientInfo a NULL pointer dereference can happen.<br /> <br /> Impact summary: Applications that process attacker-controlled CMS data may<br /> crash before authentication or cryptographic operations occur resulting in<br /> Denial of Service.<br /> <br /> When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with<br /> RSA-OAEP encryption is processed, the optional parameters field of<br /> RSA-OAEP SourceFunc algorithm identifier is examined without checking<br /> for its presence. This results in a NULL pointer dereference if the field<br /> is missing.<br /> <br /> Applications and services that call CMS_decrypt() on untrusted input<br /> (e.g., S/MIME processing or CMS-based protocols) are vulnerable.<br /> <br /> The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this<br /> issue, as the affected code is outside the OpenSSL FIPS module boundary.
Gravedad CVSS v3.1: ALTA
Última modificación:
10/04/2026

CVE-2026-34078

Fecha de publicación:
07/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
11/04/2026