CIBERPLANETA_
// threat_intelligence_dashboard

Dashboard de Amenazas

Vulnerabilidades activamente explotadas según el catálogo CISA KEV (Known Exploited Vulnerabilities)

¿Cómo se calcula el nivel de amenaza global?

El nivel de amenaza global mostrado en la barra de navegación se calcula en base al número de CVEs activamente explotados publicados en el catálogo CISA KEV (Known Exploited Vulnerabilities) durante las últimas horas:

  • 🟢 BAJA — 0 CVEs nuevos en el feed reciente
  • 🟡 MEDIA — 1 a 2 CVEs nuevos activamente explotados
  • 🟠 ALTA — 3 a 4 CVEs nuevos activamente explotados
  • 🔴 CRÍTICA — 5 o más CVEs nuevos activamente explotados

Fuente: CISA Known Exploited Vulnerabilities Catalog — actualizado cada hora.

14
CVEs añadidos este mes
1543
Total KEV catalogados
10
Vendors afectados
CVE Producto Criticidad Añadido
CVE-2025-47813 Wing FTP Server Wing FTP Server MEDIA 2026-03-16
CVE-2026-3910 Google Chromium V8 ALTA 2026-03-13
CVE-2026-3909 Google Skia ALTA 2026-03-13
CVE-2025-68613 n8n n8n CRÍTICA 2026-03-11
CVE-2021-22054 Omnissa Workspace One UEM ALTA 2026-03-09
CVE-2025-26399 SolarWinds Web Help Desk CRÍTICA 2026-03-09
CVE-2026-1603 Ivanti Endpoint Manager (EPM) ALTA 2026-03-09
CVE-2017-7921 Hikvision Multiple Products CRÍTICA 2026-03-05
CVE-2021-22681 Rockwell Multiple Products CRÍTICA 2026-03-05
CVE-2023-43000 Apple Multiple Products ALTA 2026-03-05
Microsoft
14
Apple
6
Google
5
Cisco
4
Fortinet
4
SolarWinds
3
Broadcom
3
SmarterTools
3
Gladinet
3
Ivanti
2
CVE ID Producto Descripción CVSS Añadido
CVE-2019-15271 Cisco RV Series Routers A deserialization of untrusted data vulnerability in the web-based management interface of certain Cisco Small Business… ALTA 2022-06-08
CVE-2018-6065 Google Chromium V8 Google Chromium V8 Engine contains an integer overflow vulnerability that allows a remote attacker to potentially explo… ALTA 2022-06-08
CVE-2018-4990 Adobe Acrobat and Reader Adobe Acrobat and Reader have a double free vulnerability that could lead to remote code execution. ALTA 2022-06-08
CVE-2018-17480 Google Chromium V8 Google Chromium V8 Engine contains out-of-bounds write vulnerability that allows a remote attacker to execute code insi… ALTA 2022-06-08
CVE-2018-17463 Google Chromium V8 Google Chromium V8 Engine contains an unspecified vulnerability that allows a remote attacker to execute code inside a … ALTA 2022-06-08
CVE-2017-6862 NETGEAR Multiple Devices Multiple NETGEAR devices contain a buffer overflow vulnerability that allows for authentication bypass and remote code … CRÍTICA 2022-06-08
CVE-2017-5070 Google Chromium V8 Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to execute code inside … ALTA 2022-06-08
CVE-2017-5030 Google Chromium V8 Google Chromium V8 Engine contains a memory corruption vulnerability that allows a remote attacker to execute code via … ALTA 2022-06-08
CVE-2016-5198 Google Chromium V8 Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to perfor… ALTA 2022-06-08
CVE-2016-1646 Google Chromium V8 Google Chromium V8 Engine contains an out-of-bounds read vulnerability that allows a remote attacker to cause a denial … ALTA 2022-06-08
CVE-2013-1331 Microsoft Office Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via crafted PNG … ALTA 2022-06-08
CVE-2012-5054 Adobe Flash Player Adobe Flash Player contains an integer overflow vulnerability that allows remote attackers to execute code via malforme… ALTA 2022-06-08
CVE-2012-4969 Microsoft Internet Explorer Microsoft Internet Explorer contains a use-after-free vulnerability that allows remote attackers to execute code via a … ALTA 2022-06-08
CVE-2012-1889 Microsoft XML Core Services Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution. ALTA 2022-06-08
CVE-2012-0767 Adobe Flash Player Adobe Flash Player contains a XSS vulnerability that allows remote attackers to inject web script or HTML. MEDIA 2022-06-08
CVE-2012-0754 Adobe Flash Player Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause den… ALTA 2022-06-08
CVE-2012-0151 Microsoft Windows The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the d… ALTA 2022-06-08
CVE-2011-2462 Adobe Reader and Acrobat The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could all… CRÍTICA 2022-06-08
CVE-2011-0609 Adobe Flash Player Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-o… ALTA 2022-06-08
CVE-2010-2883 Adobe Acrobat and Reader Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute co… ALTA 2022-06-08
CVE-2010-2572 Microsoft PowerPoint Microsoft PowerPoint contains a buffer overflow vulnerability that alllows for remote code execution. ALTA 2022-06-08
CVE-2010-1297 Adobe Flash Player Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause den… ALTA 2022-06-08
CVE-2009-4324 Adobe Acrobat and Reader Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file. ALTA 2022-06-08
CVE-2009-3953 Adobe Acrobat and Reader Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code … ALTA 2022-06-08
CVE-2009-1862 Adobe Acrobat and Reader, Flash Player Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS… ALTA 2022-06-08
← Anterior Página 32 / 62 (1543 CVEs total) Siguiente →
[INFO] Las fallas de inteligencia artificial en Amazon Bedrock, LangSmith y SGLang permiten la exfiltración de datos y el RCE...  ·  [INFO] El ransomware LeakNet usa ClickFix a través de sitios pirateados e implementa el cargador en memoria Deno...  ·  [INFO] La IA está en todas partes, pero los CISO siguen protegiéndola con las habilidades y herramientas de ayer, según un estudio...  ·  [INFO] Konni implementa EndRAT mediante suplantación de identidad y usa KakaoTalk para propagar malware...  ·  [INFO] La CISA señala la vulnerabilidad Wing FTP explotada activamente que filtra las rutas de los servidores...  ·  [INFO] Las fallas de inteligencia artificial en Amazon Bedrock, LangSmith y SGLang permiten la exfiltración de datos y el RCE...  ·  [INFO] El ransomware LeakNet usa ClickFix a través de sitios pirateados e implementa el cargador en memoria Deno...  ·  [INFO] La IA está en todas partes, pero los CISO siguen protegiéndola con las habilidades y herramientas de ayer, según un estudio...  ·  [INFO] Konni implementa EndRAT mediante suplantación de identidad y usa KakaoTalk para propagar malware...  ·  [INFO] La CISA señala la vulnerabilidad Wing FTP explotada activamente que filtra las rutas de los servidores...  ·