CIBERPLANETA_
// threat_intelligence_dashboard

Dashboard de Amenazas

Vulnerabilidades activamente explotadas según el catálogo CISA KEV (Known Exploited Vulnerabilities)

¿Cómo se calcula el nivel de amenaza global?

El nivel de amenaza global mostrado en la barra de navegación se calcula en base al número de CVEs activamente explotados publicados en el catálogo CISA KEV (Known Exploited Vulnerabilities) durante las últimas horas:

  • 🟢 BAJA — 0 CVEs nuevos en el feed reciente
  • 🟡 MEDIA — 1 a 2 CVEs nuevos activamente explotados
  • 🟠 ALTA — 3 a 4 CVEs nuevos activamente explotados
  • 🔴 CRÍTICA — 5 o más CVEs nuevos activamente explotados

Fuente: CISA Known Exploited Vulnerabilities Catalog — actualizado cada hora.

1
CVEs añadidos este mes
1587
Total KEV catalogados
10
Vendors afectados
CVE Producto Criticidad Añadido
CVE-2026-31431 Linux Kernel ALTA 2026-05-01
Microsoft
19
Cisco
7
Apple
7
Synacor
4
Google
4
Fortinet
3
Ivanti
3
SolarWinds
3
SmarterTools
3
Linux
2
CVE ID Producto Descripción CVSS Añadido
CVE-2022-22047 Microsoft Windows Microsoft Windows CSRSS contains an unspecified vulnerability that allows for privilege escalation to SYSTEM privileges. ALTA 2022-07-12
CVE-2022-26925 Microsoft Windows Microsoft Windows Local Security Authority (LSA) contains a spoofing vulnerability where an attacker can coerce the dom… ALTA 2022-07-01
CVE-2022-29499 Mitel MiVoice Connect The Service Appliance component in Mitel MiVoice Connect allows remote code execution due to incorrect data validation. CRÍTICA 2022-06-27
CVE-2021-30533 Google Chromium PopupBlocker Google Chromium PopupBlocker contains an insufficient policy enforcement vulnerability that allows a remote attacker to… MEDIA 2022-06-27
CVE-2021-4034 Red Hat Polkit The Red Hat polkit pkexec utility contains an out-of-bounds read and write vulnerability that allows for privilege esca… ALTA 2022-06-27
CVE-2021-30983 Apple iOS and iPadOS Apple iOS and iPadOS contain a buffer overflow vulnerability that could allow an application to execute code with kerne… ALTA 2022-06-27
CVE-2020-3837 Apple Multiple Products Apple iOS, iPadOS, macOS, tvOS, and watchOS contain a memory corruption vulnerability that could allow an application t… ALTA 2022-06-27
CVE-2020-9907 Apple Multiple Products Apple iOS, iPadOS, and tvOS contain a memory corruption vulnerability that could allow an application to execute code w… ALTA 2022-06-27
CVE-2019-8605 Apple Multiple Products A use-after-free vulnerability in Apple iOS, macOS, tvOS, and watchOS could allow a malicious application to execute co… ALTA 2022-06-27
CVE-2018-4344 Apple Multiple Products Apple iOS, macOS, tvOS, and watchOS contain a memory corruption vulnerability which can allow for code execution. ALTA 2022-06-27
CVE-2022-30190 Microsoft Windows A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such… ALTA 2022-06-14
CVE-2021-38163 SAP NetWeaver SAP NetWeaver contains a vulnerability that allows unrestricted file upload. CRÍTICA 2022-06-09
CVE-2016-2386 SAP NetWeaver SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arb… CRÍTICA 2022-06-09
CVE-2016-2388 SAP NetWeaver The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user info… MEDIA 2022-06-09
CVE-2019-7195 QNAP Photo Station QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attac… CRÍTICA 2022-06-08
CVE-2019-7194 QNAP Photo Station QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attac… CRÍTICA 2022-06-08
CVE-2019-7193 QNAP QTS QNAP QTS contains an improper input validation vulnerability allowing remote attackers to inject code on the system. CRÍTICA 2022-06-08
CVE-2019-7192 QNAP Photo Station QNAP NAS devices running Photo Station contain an improper access control vulnerability allowing remote attackers to ga… CRÍTICA 2022-06-08
CVE-2019-5825 Google Chromium V8 Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially ex… MEDIA 2022-06-08
CVE-2019-15271 Cisco RV Series Routers A deserialization of untrusted data vulnerability in the web-based management interface of certain Cisco Small Business… ALTA 2022-06-08
CVE-2018-6065 Google Chromium V8 Google Chromium V8 Engine contains an integer overflow vulnerability that allows a remote attacker to potentially explo… ALTA 2022-06-08
CVE-2018-4990 Adobe Acrobat and Reader Adobe Acrobat and Reader have a double free vulnerability that could lead to remote code execution. ALTA 2022-06-08
CVE-2018-17480 Google Chromium V8 Google Chromium V8 Engine contains out-of-bounds write vulnerability that allows a remote attacker to execute code insi… ALTA 2022-06-08
CVE-2018-17463 Google Chromium V8 Google Chromium V8 Engine contains an unspecified vulnerability that allows a remote attacker to execute code inside a … ALTA 2022-06-08
CVE-2017-6862 NETGEAR Multiple Devices Multiple NETGEAR devices contain a buffer overflow vulnerability that allows for authentication bypass and remote code … CRÍTICA 2022-06-08
← Anterior Página 33 / 64 (1587 CVEs total) Siguiente →
[INFO] CVE-2026-31431: Vulnerabilidad de Escalada de Privilegios en Linux Kernel  ·  [INFO] CVE-2026-41940: Vulnerabilidad Crítica de Bypass de Autenticación en cPanel & WHM y WP2  ·  [INFO] CVE-2024-1708: Path Traversal en ConnectWise ScreenConnect Explotado Activamente  ·  [INFO] CVE-2026-32202: Fallo en Mecanismo de Protección en Microsoft Windows  ·  [INFO] CVE-2024-57726: Vulnerabilidad Crítica de Autorización en SimpleHelp  ·  [INFO] CVE-2026-31431: Vulnerabilidad de Escalada de Privilegios en Linux Kernel  ·  [INFO] CVE-2026-41940: Vulnerabilidad Crítica de Bypass de Autenticación en cPanel & WHM y WP2  ·  [INFO] CVE-2024-1708: Path Traversal en ConnectWise ScreenConnect Explotado Activamente  ·  [INFO] CVE-2026-32202: Fallo en Mecanismo de Protección en Microsoft Windows  ·  [INFO] CVE-2024-57726: Vulnerabilidad Crítica de Autorización en SimpleHelp  ·