Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-71225

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> md: suspend array while updating raid_disks via sysfs<br /> <br /> In raid1_reshape(), freeze_array() is called before modifying the r1bio<br /> memory pool (conf-&gt;r1bio_pool) and conf-&gt;raid_disks, and<br /> unfreeze_array() is called after the update is completed.<br /> <br /> However, freeze_array() only waits until nr_sync_pending and<br /> (nr_pending - nr_queued) of all buckets reaches zero. When an I/O error<br /> occurs, nr_queued is increased and the corresponding r1bio is queued to<br /> either retry_list or bio_end_io_list. As a result, freeze_array() may<br /> unblock before these r1bios are released.<br /> <br /> This can lead to a situation where conf-&gt;raid_disks and the mempool have<br /> already been updated while queued r1bios, allocated with the old<br /> raid_disks value, are later released. Consequently, free_r1bio() may<br /> access memory out of bounds in put_all_bios() and release r1bios of the<br /> wrong size to the new mempool, potentially causing issues with the<br /> mempool as well.<br /> <br /> Since only normal I/O might increase nr_queued while an I/O error occurs,<br /> suspending the array avoids this issue.<br /> <br /> Note: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends<br /> the array. Therefore, we suspend the array when updating raid_disks<br /> via sysfs to avoid this issue too.
Gravedad: Pendiente de análisis
Última modificación:
18/02/2026

CVE-2025-71226

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP<br /> <br /> Since commit dfb073d32cac ("ptp: Return -EINVAL on ptp_clock_register if<br /> required ops are NULL"), PTP clock registered through ptp_clock_register<br /> is required to have ptp_clock_info.settime64 set, however, neither MVM<br /> nor MLD&amp;#39;s PTP clock implementation sets it, resulting in warnings when<br /> the interface starts up, like<br /> <br /> WARNING: drivers/ptp/ptp_clock.c:325 at ptp_clock_register+0x2c8/0x6b8, CPU#1: wpa_supplicant/469<br /> CPU: 1 UID: 0 PID: 469 Comm: wpa_supplicant Not tainted 6.18.0+ #101 PREEMPT(full)<br /> ra: ffff800002732cd4 iwl_mvm_ptp_init+0x114/0x188 [iwlmvm]<br /> ERA: 9000000002fdc468 ptp_clock_register+0x2c8/0x6b8<br /> iwlwifi 0000:01:00.0: Failed to register PHC clock (-22)<br /> <br /> I don&amp;#39;t find an appropriate firmware interface to implement settime64()<br /> for iwlwifi MLD/MVM, thus instead create a stub that returns<br /> -EOPTNOTSUPP only, suppressing the warning and allowing the PTP clock to<br /> be registered.
Gravedad: Pendiente de análisis
Última modificación:
18/02/2026

CVE-2025-71227

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mac80211: don&amp;#39;t WARN for connections on invalid channels<br /> <br /> It&amp;#39;s not clear (to me) how exactly syzbot managed to hit this,<br /> but it seems conceivable that e.g. regulatory changed and has<br /> disabled a channel between scanning (channel is checked to be<br /> usable by cfg80211_get_ies_channel_number) and connecting on<br /> the channel later.<br /> <br /> With one scenario that isn&amp;#39;t covered elsewhere described above,<br /> the warning isn&amp;#39;t good, replace it with a (more informative)<br /> error message.
Gravedad: Pendiente de análisis
Última modificación:
18/02/2026

CVE-2025-71228

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED<br /> <br /> For 32BIT platform _PAGE_PROTNONE is 0, so set a VMA to be VM_NONE or<br /> VM_SHARED will make pages non-present, then cause Oops with kernel page<br /> fault.<br /> <br /> Fix it by set correct protection_map[] for VM_NONE/VM_SHARED, replacing<br /> _PAGE_PROTNONE with _PAGE_PRESENT.
Gravedad: Pendiente de análisis
Última modificación:
18/02/2026

CVE-2026-1404

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction &amp; Membership Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the filter parameters (e.g., &amp;#39;filter_first_name&amp;#39;) in all versions up to, and including, 2.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Gravedad CVSS v3.1: MEDIA
Última modificación:
18/02/2026

CVE-2025-61982

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
18/02/2026

CVE-2026-2464

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment.
Gravedad CVSS v4.0: ALTA
Última modificación:
18/02/2026

CVE-2026-2654

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A weakness has been identified in huggingface smolagents 1.24.0. Impacted is the function requests.get/requests.post of the component LocalPythonExecutor. Executing a manipulation can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2026-2655

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was detected in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::str_less::operator of the file include/chaiscript/chaiscript_defines.hpp. The manipulation results in use after free. The attack requires a local approach. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Gravedad CVSS v4.0: BAJA
Última modificación:
19/02/2026

CVE-2026-1441

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim&amp;#39;s browser and limited manipulation of the affected user&amp;#39;s session context, through the  &amp;#39;/system/index_sets/&amp;#39; endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2026-1440

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim&amp;#39;s browser and limited manipulation of the affected user&amp;#39;s session context, through the  &amp;#39;/system/pipelines/&amp;#39; endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026

CVE-2026-1439

Fecha de publicación:
18/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim&amp;#39;s browser and limited manipulation of the affected user&amp;#39;s session context, through the  &amp;#39;/<br /> <br /> alerts<br /> <br /> /&amp;#39; endpoint.
Gravedad CVSS v4.0: MEDIA
Última modificación:
18/02/2026