Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-31962

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. While most alignment records store DNA sequence and quality values, the format also allows them to omit this data in certain cases to save space. Due to some quirks of the CRAM format, it is necessary to handle these records carefully as they will actually store data that needs to be consumed and then discarded. Unfortunately the `cram_decode_seq()` did not handle this correctly in some cases. Where this happened it could result in reading a single byte from beyond the end of a heap allocation, followed by writing a single attacker-controlled byte to the same location. Exploiting this bug causes a heap buffer overflow. If a user opens a file crafted to exploit this issue, it could lead to the program crashing, or overwriting of data and heap structures in ways not expected by the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue.
Gravedad CVSS v4.0: ALTA
Última modificación:
18/03/2026

CVE-2026-32611

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.
Gravedad CVSS v3.1: ALTA
Última modificación:
18/03/2026

CVE-2026-32632

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** Glances is an open-source system cross-platform monitoring tool. Glances recently added DNS rebinding protection for the MCP endpoint, but prior to version 4.5.2, the main REST/WebUI FastAPI application still accepts arbitrary `Host` headers and does not apply `TrustedHostMiddleware` or an equivalent host allowlist. As a result, the REST API, WebUI, and token endpoint remain reachable through attacker-controlled domains in classic DNS rebinding scenarios. Once the victim browser has rebound the attacker domain to the Glances service, same-origin policy no longer protects the API because the browser considers the rebinding domain to be the origin. This is a distinct issue from the previously reported default CORS weakness. CORS is not required for exploitation here because DNS rebinding causes the victim browser to treat the malicious domain as same-origin with the rebinding target. Version 4.5.2 contains a patch for the issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
18/03/2026

CVE-2026-32633

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated in-place during background polling and can contain a `uri` field with embedded HTTP Basic credentials for downstream Glances servers, using the reusable pbkdf2-derived Glances authentication secret. If the front Glances Browser/API instance is started without `--password`, which is supported and common for internal network deployments, `/api/4/serverslist` is completely unauthenticated. Any network user who can reach the Browser API can retrieve reusable credentials for protected downstream Glances servers once they have been polled by the browser instance. Version 4.5.2 fixes the issue.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
18/03/2026

CVE-2026-29856

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** An issue in the VirtualHost configuration handling/parser component of aaPanel v7.57.0 allows attackers to cause a Regular Expression Denial of Service (ReDoS) via a crafted input.
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026

CVE-2026-29858

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** A lack of path validation in aaPanel v7.57.0 allows attackers to execute a local file inclusion (LFI), leadingot sensitive information exposure.
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026

CVE-2026-29859

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** An arbitrary file upload vulnerability in aaPanel v7.57.0 allows attackers to execute arbitrary code via uploading a crafted file.
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026

CVE-2026-30048

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** A stored cross-site scripting (XSS) vulnerability exists in the NotChatbot WebChat widget thru 1.4.4. User-supplied input is not properly sanitized before being stored and rendered in the chat conversation history. This allows an attacker to inject arbitrary JavaScript code which is executed when the chat history is reloaded. The issue is reproducible across multiple independent implementations of the widget, indicating that the vulnerability resides in the product itself rather than in a specific website configuration.
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026

CVE-2026-30701

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The web interface of the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) contains hardcoded credential disclosure mechanisms (in the form of Server Side Include) within multiple server-side web pages, including login.shtml and settings.shtml. These pages embed server-side execution directives that dynamically retrieve and expose the web administration password from non-volatile memory at runtime.
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026

CVE-2026-30702

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026

CVE-2026-30703

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** A command injection vulnerability exists in the web management interface of the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02). The adm.cgi endpoint improperly sanitizes user-supplied input provided to a command-related parameter in the sysCMD functionality.
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026

CVE-2026-23270

Fecha de publicación:
18/03/2026
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks<br /> <br /> As Paolo said earlier [1]:<br /> <br /> "Since the blamed commit below, classify can return TC_ACT_CONSUMED while<br /> the current skb being held by the defragmentation engine. As reported by<br /> GangMin Kim, if such packet is that may cause a UaF when the defrag engine<br /> later on tries to tuch again such packet."<br /> <br /> act_ct was never meant to be used in the egress path, however some users<br /> are attaching it to egress today [2]. Attempting to reach a middle<br /> ground, we noticed that, while most qdiscs are not handling<br /> TC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we<br /> address the issue by only allowing act_ct to bind to clsact/ingress<br /> qdiscs and shared blocks. That way it&amp;#39;s still possible to attach act_ct to<br /> egress (albeit only with clsact).<br /> <br /> [1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/<br /> [2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/
Gravedad: Pendiente de análisis
Última modificación:
18/03/2026