Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2026-34524

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by supplying avatar_url="..". This issue has been patched in version 1.17.0.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/04/2026

CVE-2026-34121

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks.<br /> <br /> Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state.
Gravedad CVSS v4.0: ALTA
Última modificación:
06/04/2026

CVE-2026-34120

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the asynchronous parsing of local video stream content due to<br /> insufficient alignment and validation of buffer boundaries when processing streaming inputs.An attacker<br /> on the same network segment could trigger heap memory corruption conditions by<br /> sending crafted payloads that cause write operations beyond allocated buffer<br /> boundaries.  Successful exploitation<br /> causes a Denial-of-Service (DoS) condition, causing the device’s process to<br /> crash or become unresponsive.
Gravedad CVSS v4.0: ALTA
Última modificación:
06/04/2026

CVE-2026-34119

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP parsing<br /> loop<br /> when appending segmented request bodies without<br /> continuous write‑boundary verification, due to insufficient boundary validation when handling externally supplied HTTP input.  An attacker<br /> on the same network segment could trigger heap memory corruption conditions by<br /> sending crafted payloads that cause write operations beyond allocated buffer<br /> boundaries.  Successful exploitation<br /> causes a Denial-of-Service (DoS) condition, causing the device’s process to<br /> crash or become unresponsive.
Gravedad CVSS v4.0: ALTA
Última modificación:
06/04/2026

CVE-2026-34118

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 in the HTTP POST body parsing logic due to missing validation of remaining buffer capacity after dynamic allocation, due to insufficient boundary validation when handling externally supplied HTTP input.  An attacker<br /> on the same network segment could trigger heap memory corruption conditions by<br /> sending crafted payloads that cause write operations beyond allocated buffer<br /> boundaries.  Successful exploitation<br /> causes a Denial-of-Service (DoS) condition, causing the device’s process to<br /> crash or become unresponsive.
Gravedad CVSS v4.0: ALTA
Última modificación:
06/04/2026

CVE-2026-33271

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis True Image (Windows) before build 42902.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/04/2026

CVE-2026-28728

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42902.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/04/2026

CVE-2026-32762

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21 and 3.2.0 to before 3.2.6, Rack::Utils.forwarded_values parses the RFC 7239 Forwarded header by splitting on semicolons before handling quoted-string values. Because quoted values may legally contain semicolons, a header can be interpreted by Rack as multiple Forwarded directives rather than as a single quoted for value. In deployments where an upstream proxy, WAF, or intermediary validates or preserves quoted Forwarded values differently, this discrepancy can allow an attacker to smuggle host, proto, for, or by parameters through a single header value. This issue has been patched in versions 3.1.21 and 3.2.6.
Gravedad CVSS v3.1: MEDIA
Última modificación:
21/04/2026

CVE-2026-27774

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42902.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/04/2026

CVE-2026-26962

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6.
Gravedad CVSS v3.1: MEDIA
Última modificación:
21/04/2026

CVE-2026-5353

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was detected in Trendnet TEW-657BRM 1.00.1. Affected is the function ping_test of the file /setup.cgi. Performing a manipulation of the argument c4_IPAddr results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website&amp;#39;s product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
Gravedad CVSS v4.0: BAJA
Última modificación:
29/04/2026

CVE-2026-5354

Fecha de publicación:
02/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw has been found in Trendnet TEW-657BRM 1.00.1. Affected by this vulnerability is the function vpn_connect of the file /setup.cgi. Executing a manipulation of the argument policy_name can lead to os command injection. The attack can be executed remotely. The exploit has been published and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website&amp;#39;s product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer.
Gravedad CVSS v4.0: BAJA
Última modificación:
29/04/2026