Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2020-37221

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Atomic Alarm Clock 6.3 contains a stack overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string to the display name textbox in the Time Zones Clock configuration. Attackers can craft a buffer with structured exception handling overwrite and encoded shellcode to bypass SafeSEH protections and execute arbitrary commands with application privileges.
Gravedad CVSS v4.0: ALTA
Última modificación:
13/05/2026

CVE-2020-37169

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** WordPress Plugin ultimate-member 2.1.3 contains a local file inclusion vulnerability that allows authenticated attackers to include arbitrary files by manipulating the pack parameter in class-admin-upgrade.php. Attackers can send POST requests with malicious pack values to include unintended PHP files from the packages directory and execute arbitrary code.
Gravedad CVSS v4.0: MEDIA
Última modificación:
13/05/2026

CVE-2020-37174

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** WOOF Products Filter for WooCommerce 1.2.3 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by entering XSS payloads in design tab textfields. Attackers can inject JavaScript code through fields like 'Text for block toggle' and 'Custom front css styles' that executes on frontend pages when saved, affecting all site visitors.
Gravedad CVSS v4.0: MEDIA
Última modificación:
13/05/2026

CVE-2020-37168

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Ecommerce Systempay 1.0 contains a weak cryptographic implementation vulnerability that allows attackers to brute force the 16-character production secret key used for payment signature generation. Attackers can extract payment form data and signatures from POST requests to the payment endpoint, then use SHA1 hash comparison to iteratively test key candidates until discovering the correct production key, enabling them to forge valid payment signatures and manipulate transaction amounts.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
13/05/2026

CVE-2026-8463

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Crypt::Argon2 versions from 0.017 before 0.031 for Perl perform a heap out-of-bounds read in argon2_verify on empty encoded input.<br /> <br /> The auto-detect form of argon2_verify passes encoded_len - 1 as the length argument to memchr without checking that encoded_len is non-zero. When the encoded string is empty, the size_t subtraction underflows to SIZE_MAX and memchr scans adjacent heap memory looking for a &amp;#39;$&amp;#39; separator byte.<br /> <br /> A caller that invokes argon2_verify against a stored hash that may legitimately be empty (for example a placeholder row or a NULL column materialised as an empty string) reads out-of-bounds heap memory, which can crash the process or leak the position of an adjacent &amp;#39;$&amp;#39; byte into subsequent parsing.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-8369

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Input Validation in the NAT64 translator in The OpenThread Authors OpenThread before commit 26a882d on all platforms allows an attacker on the adjacent IPv4 network to inject corrupted IPv6 packets into the Thread mesh or bypass security checks via crafted IPv4 packets with options.
Gravedad CVSS v4.0: MEDIA
Última modificación:
13/05/2026

CVE-2026-4607

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 5.9.8.4. This is due to the plugin not properly verifying that a user is authorized to perform an action via the pm_set_group_order, pm_set_group_items, and pm_set_field_order AJAX actions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify site-wide ProfileGrid group settings including group menu order, group list order, group icon display, and field ordering.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-4608

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to blind SQL Injection via the &amp;#39;rid&amp;#39; parameter in all versions up to, and including, 5.9.8.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-4609

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the pm_invite_user function in all versions up to, and including, 5.9.8.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add themselves or any registered user to any ProfileGrid group, including closed and paid groups, bypassing all authorization and payment gates.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/05/2026

CVE-2026-39806

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Loop with Unreachable Exit Condition (&amp;#39;Infinite Loop&amp;#39;) vulnerability in mtrudel bandit allows unauthenticated remote denial of service via worker process exhaustion.<br /> <br /> &amp;#39;Elixir.Bandit.HTTP1.Socket&amp;#39;:do_read_chunked_data!/5 in lib/bandit/http1/socket.ex terminates only when the last-chunk line 0\r\n is followed immediately by the empty trailer line \r\n. RFC 9112 §7.1.2 permits zero or more trailer fields between them. When trailers are present, none of the match clauses fit: the catch-all arm computes a negative to_read, calls read_available!/2, receives on timeout, and tail-recurses with unchanged state. The worker process is pinned for the lifetime of the TCP connection.<br /> <br /> A handful of concurrent connections sending RFC-conformant chunked requests with trailer fields is sufficient to exhaust the Bandit worker pool and render the server unresponsive to all further traffic. No authentication, special headers, or large payload is required. Proxies such as NGINX and HAProxy legitimately forward trailer-bearing requests, so servers behind such proxies may be affected without any malicious client involvement.<br /> <br /> This issue affects bandit: from 1.6.1 before 1.11.1.
Gravedad CVSS v4.0: ALTA
Última modificación:
13/05/2026

CVE-2026-39803

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthenticated remote denial of service via memory exhaustion.<br /> <br /> The chunked clause of &amp;#39;Elixir.Bandit.HTTP1.Socket&amp;#39;:read_data/2 in lib/bandit/http1/socket.ex ignores the caller-supplied :length option when reading HTTP/1 chunked request bodies. Instead of capping the accumulated body at the configured limit (e.g. Plug.Parsers&amp;#39; default 8 MB), do_read_chunked_data!/5 buffers every received chunk into an iolist unconditionally and materializes the entire body as a single binary. The function always returns {:ok, body, ...}, so callers cannot interpose a 413 response.<br /> <br /> Because Plug.Parsers runs before routing and authentication in the standard Phoenix endpoint, an unauthenticated attacker needs no valid route or credentials. Sending a single Transfer-Encoding: chunked POST request with an arbitrarily large body to any path causes the BEAM process to exhaust available memory and be terminated by the OS OOM killer.<br /> <br /> The content-length path in the same function correctly enforces the limit and is not affected.<br /> <br /> This issue affects bandit: from 1.4.0 before 1.11.1.
Gravedad CVSS v4.0: ALTA
Última modificación:
13/05/2026

CVE-2026-37429

Fecha de publicación:
13/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** qihang-wms commit 75c15a was discovered to contain a SQL injection vulnerability via the datascope parameter in the SysUserMapper.xml file. This vulnerability allows attackers to access sensitive database information, including users&amp;#39; Personally Identifiable Information (PII) via a crafted SQL statement.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026