Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-6337

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
Gravedad: Pendiente de análisis
Última modificación:
27/04/2026

CVE-2026-40514

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** SmarterTools SmarterMail builds prior to 9610 contain a cryptographic weakness in the file and email sharing endpoints that use DES-CBC encryption with keys and initialization vectors derived from System.Random seeded with insufficient entropy, reducing the seed space to approximately 19,000 possible values. An unauthenticated attacker can use the attachment download endpoint as an oracle to determine the seed in use and derive encryption keys and initialization vectors to forge sharing tokens for arbitrary emails, attachments, or file storage contents without prior access to the targeted content.
Gravedad CVSS v4.0: ALTA
Última modificación:
27/04/2026

CVE-2026-6357

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** pip prior to version 26.1 would run self-update check functionality after installing wheel files which required importing well-known Python modules names. These module imports were intentionally deferred to increase startup time of the pip CLI. The patch changes self-update functionality to run before wheels are installed to prevent newly-installed modules from being imported shortly after the installation of a wheel package. Users should still review package contents prior to installation.
Gravedad CVSS v4.0: MEDIA
Última modificación:
27/04/2026

CVE-2026-30350

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Gravedad CVSS v3.1: ALTA
Última modificación:
27/04/2026

CVE-2026-7130

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. The affected element is an unknown function of the file /ajax.php?action=delete_category. Executing a manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
29/04/2026

CVE-2026-7126

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security flaw has been discovered in SourceCodester Pharmacy Sales and Inventory System 1.0. This affects an unknown part of the file /ajax.php?action=save_category. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Gravedad CVSS v4.0: MEDIA
Última modificación:
29/04/2026

CVE-2026-7127

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A weakness has been identified in SourceCodester Pharmacy Sales and Inventory System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=delete_receiving. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Gravedad CVSS v4.0: MEDIA
Última modificación:
29/04/2026

CVE-2026-7128

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security vulnerability has been detected in SourceCodester Pharmacy Sales and Inventory System 1.0. This issue affects some unknown processing of the file /ajax.php?action=save_type. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
29/04/2026

CVE-2026-7129

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1.0. Impacted is an unknown function of the file /index.php?page=categories. Performing a manipulation of the argument ID results in cross site scripting. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Gravedad CVSS v4.0: BAJA
Última modificación:
29/04/2026

CVE-2026-6265

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Insecure preserved inherited permissions vulnerability in Cerberus FTP Server on Windows allows Privilege Escalation.This issue has been resolved in Cerberus FTP Server: 2026.1
Gravedad CVSS v4.0: ALTA
Última modificación:
07/05/2026

CVE-2026-41081

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Handling of TLS Client Authentication Failure Leading to Anonymous Principal Assignment in Apache Storm<br /> <br /> Versions Affected: up to 2.8.7<br /> <br /> Description: When TLS transport is enabled in Apache Storm without requiring client certificate authentication (the default configuration), the TlsTransportPlugin assigns a fallback principal (CN=ANONYMOUS) if no client certificate is presented or if certificate verification fails. The underlying SSLPeerUnverifiedException is caught and suppressed rather than rejecting the connection.<br /> <br /> This fail-open behavior means an unauthenticated client can establish a TLS connection and receive a valid principal identity. If the configured authorizer (e.g., SimpleACLAuthorizer) does not explicitly deny access to CN=ANONYMOUS, this may result in unauthorized access to Storm services. The condition is logged at debug level only, reducing visibility in production.<br /> <br /> Impact: Unauthenticated clients may be assigned a principal identity, potentially bypassing authorization in permissive or misconfigured environments.<br /> <br /> Mitigation: Users should upgrade to 2.8.7 in which TLS authentication failures are handled in a fail-closed manner.<br /> <br /> Users who cannot upgrade immediately should:<br /> - Enable mandatory client certificate authentication (nimbus.thrift.tls.client.auth.required: true)<br /> - Ensure authorization rules explicitly deny access to CN=ANONYMOUS<br /> - Review all ACL configurations for implicit default-allow behavior
Gravedad CVSS v3.1: MEDIA
Última modificación:
28/04/2026

CVE-2026-40557

Fecha de publicación:
27/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Certificate Validation via Global SSL Context Downgrade in Apache Storm Prometheus Reporter<br /> <br /> <br /> Versions Affected: from 2.6.3 to 2.8.6<br /> <br /> <br /> Description: <br /> <br /> In production deployments where an administrator enables storm.daemon.metrics.reporter.plugin.prometheus.skip_tls_validation (by default it is disabled) intending to affect only the Prometheus reporter, the undocumented global side effect creates an attack surface across every TLS-protected communication channel in the Storm daemon.<br /> <br /> <br /> The PrometheusPreparableReporter class implements an INSECURE_TRUST_MANAGER that accepts all SSL certificates without validation, with empty checkClientTrusted and checkServerTrusted methods. Most critically, when the storm.daemon.metrics.reporter.plugin.prometheus.skip_tls_validation configuration option is enabled (default = disabled) for HTTPS Prometheus PushGateway connections, the INSECURE_CONNECTION_FACTORY calls SSLContext.setDefault(sslContext), which globally replaces the JVM&amp;#39;s default SSL context rather than applying the insecure context only to the Prometheus connection. This payload flows through storm.yaml configuration → PrometheusPreparableReporter.prepare() → INSECURE_CONNECTION_FACTORY → SSLContext.setDefault(), resulting in a JVM-wide TLS security downgrade. All subsequent HTTPS connections in the process - including ZooKeeper, Thrift, Netty, and UI connections - silently trust all certificates, including self-signed, expired, and attacker-generated ones, enabling man-in-the-middle interception of cluster state, topology submissions, tuple data, and administrative credentials.<br /> <br /> <br /> <br /> <br /> Mitigation: 2.x users should upgrade to 2.8.7 if the Prometheus Metrics Reporter is used. Prometheus Metrics Reporter Users who cannot upgrade immediately should remove the storm.daemon.metrics.reporter.plugin.prometheus.skip_tls_validation: true setting from their storm.yaml configuration and instead configure a proper truststore containing the PushGateway&amp;#39;s certificate.
Gravedad CVSS v3.1: MEDIA
Última modificación:
05/05/2026