Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-8121

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability has been found in Open5GS up to 2.7.7. The impacted element is the function ogs_sbi_parse_plmn_list in the library /lib/sbi/conv.c of the component NSSF. The manipulation leads to denial of service. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: BAJA
Última modificación:
11/05/2026

CVE-2026-8120

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw has been found in Open5GS up to 2.7.7. The affected element is the function nssf_nnrf_nsselection_handle_get_from_amf_or_vnssf of the file /src/nssf/nnssf-handler.c of the component NSSF. Executing a manipulation can lead to denial of service. The attack can be executed remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: BAJA
Última modificación:
11/05/2026

CVE-2026-8119

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was detected in Open5GS up to 2.7.7. Impacted is the function ogs_sbi_stream_find_by_id in the library /lib/sbi/nghttp2-server.c of the component NSSF. Performing a manipulation results in denial of service. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: BAJA
Última modificación:
11/05/2026

CVE-2026-8117

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security vulnerability has been detected in SourceCodester Pizzafy Ecommerce System 1.0. This issue affects some unknown processing of the file /admin/index.php. Such manipulation of the argument page leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Gravedad CVSS v4.0: BAJA
Última modificación:
08/05/2026

CVE-2026-8116

Fecha de publicación:
08/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A weakness has been identified in huangjunsen0406 xiaozhi-mcphub up to 1.0.3. This vulnerability affects unknown code of the file src/controllers/dxtController.ts. This manipulation of the argument manifest.name causes path traversal. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: BAJA
Última modificación:
08/05/2026

CVE-2026-8115

Fecha de publicación:
07/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security flaw has been discovered in gyoridavid short-video-maker up to 1.3.4. This affects an unknown part of the file src/server/routers/rest.ts of the component REST API. The manipulation of the argument req.params.tmpFile results in path traversal. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: MEDIA
Última modificación:
08/05/2026

CVE-2026-6411

Fecha de publicación:
07/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** This vulnerability, in the MAXHUB Pivot client application versions <br /> prior to v1.36.2, may allow an attacker to obtain encrypted tenant email<br /> addresses and related metadata from any tenant. Due to the presence of a<br /> hardcoded AES key within the application, the encrypted data can be <br /> decrypted, enabling access to tenant email addresses and associated <br /> information in cleartext. Furthermore, an attacker may be able to cause a<br /> denial-of-service condition by enrolling multiple unauthorized devices <br /> into a tenant via MQTT, potentially disrupting tenant operations.
Gravedad CVSS v3.1: ALTA
Última modificación:
08/05/2026

CVE-2026-42880

Fecha de publicación:
07/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. From versions 3.2.0 to before 3.2.11 and 3.3.0 to before 3.3.9, there is a missing authorization and data-masking gap in Argo CD&amp;#39;s ServerSideDiff endpoint that allows an attacker with read-only access to extract plaintext Kubernetes Secret data from etcd via the Kubernetes API server&amp;#39;s Server-Side Apply dry-run mechanism. This issue has been patched in versions 3.2.11 and 3.3.9.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
11/05/2026

CVE-2026-2710

Fecha de publicación:
07/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Gravedad: Pendiente de análisis
Última modificación:
07/05/2026

CVE-2026-7891

Fecha de publicación:
07/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The VerySecureApp made by DIVD using Mendix Studio Pro 11.8.0 Beta allows unintended data exposure due to authorization misconfiguration. The VerySecureApp allows anonymous users of the MyFirstModule with the anonymous user role to gain access to all stored records, even though no access rights are explicitly configured on that role. Anonymous users are required to make a Mendix Entity available publicly. All versions of Mendix Studio Pro up to 11.8.0 Beta silently make an Anonymous user role follow user inheritance rules, without mentioning this explicitly in the documentation.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
08/05/2026

CVE-2026-8112

Fecha de publicación:
07/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affected is the function executeCognitivePulse of the file src/kernel.ts. Performing a manipulation results in os command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The patch is named 028f62216dee9f64833d0f1cfda7c217067ceba8. To fix this issue, it is recommended to deploy a patch.
Gravedad CVSS v4.0: BAJA
Última modificación:
08/05/2026

CVE-2026-8113

Fecha de publicación:
07/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the component executeSkillScript. Executing a manipulation can lead to path traversal. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. This patch is called e8bd4e17e9428260f2161378356affc5ce90d6ed. It is advisable to implement a patch to correct this issue.
Gravedad CVSS v4.0: BAJA
Última modificación:
08/05/2026