Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2025-43992

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains an authentication bypass by assumed-immutable data vulnerability in Geo replication. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to unauthorized access to data in transit.
Gravedad CVSS v3.1: MEDIA
Última modificación:
16/05/2026

CVE-2024-0391

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The check user account lock states feature within the email OTP flow fails to validate user input, allowing an attacker to infer the existence of registered user accounts.<br /> <br /> The discovery of valid usernames can increase the risk of brute-force and social engineering attacks. Attackers can leverage this information to craft targeted phishing campaigns or other malicious activities aimed at tricking users into divulging sensitive data, potentially damaging the organization&amp;#39;s reputation and leading to regulatory non-compliance and financial consequences.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-43826

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The OpenSearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-opensearch` 1.9.1 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[opensearch] host` URL.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-41018

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-elasticsearch` 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[elasticsearch] host` URL.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-5084

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** WebDyne::Session versions through 2.075 for Perl generates the session id insecurely.<br /> <br /> The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the seed of the message digest.<br /> <br /> The rand function is seeded by 32-bits and is predictable. It is considered unsuitable for cryptographic purposes.<br /> <br /> Predictable session ids could allow an attacker to gain access to systems.<br /> <br /> Note that WebDyne::Session versions 1.042 and earlier appear to be in separate distributions from WebDyne.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/05/2026

CVE-2026-43500

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present<br /> <br /> The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE<br /> handler in rxrpc_verify_response() copy the skb to a linear one before<br /> calling into the security ops only when skb_cloned() is true. An skb<br /> that is not cloned but still carries externally-owned paged fragments<br /> (e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via<br /> __ip_append_data, or a chained skb_has_frag_list()) falls through to<br /> the in-place decryption path, which binds the frag pages directly into<br /> the AEAD/skcipher SGL via skb_to_sgvec().<br /> <br /> Extend the gate to also unshare when skb_has_frag_list() or<br /> skb_has_shared_frag() is true. This catches the splice-loopback vector<br /> and other externally-shared frag sources while preserving the<br /> zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC<br /> page_pool RX, GRO). The OOM/trace handling already in place is reused.
Gravedad CVSS v3.1: ALTA
Última modificación:
17/05/2026

CVE-2026-8276

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.
Gravedad CVSS v4.0: BAJA
Última modificación:
13/05/2026

CVE-2026-6433

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize user input before using it in a SQL query, and the result is passed to eval(), allowing unauthenticated users to execute arbitrary PHP code on the server.
Gravedad CVSS v3.1: ALTA
Última modificación:
12/05/2026

CVE-2026-8275

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
Gravedad CVSS v4.0: BAJA
Última modificación:
13/05/2026

CVE-2026-1677

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** Zephyr sockets created with `IPPROTO_TLS_1_3` can still negotiate a TLS 1.2 connection when both TLS versions are enabled in Kconfig, because the socket-level protocol selection is not propagated to mbedTLS (e.g. via `mbedtls_ssl_conf_min_tls_version`). The ClientHello advertises both versions and the peer can establish TLS 1.2, so applications that assumed `IPPROTO_TLS_1_3` enforces TLS 1.3 may silently use TLS 1.2 and remain exposed to TLS 1.2-specific weaknesses. As a workaround, the `TLS_CIPHERSUITE_LIST` socket option can be restricted to TLS 1.3-only cipher suites.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/05/2026

CVE-2026-8273

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.
Gravedad CVSS v4.0: MEDIA
Última modificación:
11/05/2026

CVE-2026-8272

Fecha de publicación:
11/05/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Gravedad CVSS v4.0: BAJA
Última modificación:
11/05/2026