CIBERPLANETA_
// threat_intelligence_dashboard

Dashboard de Amenazas

Vulnerabilidades activamente explotadas según el catálogo CISA KEV (Known Exploited Vulnerabilities)

¿Cómo se calcula el nivel de amenaza global?

El nivel de amenaza global mostrado en la barra de navegación se calcula en base al número de CVEs activamente explotados publicados en el catálogo CISA KEV (Known Exploited Vulnerabilities) durante las últimas horas:

  • 🟢 BAJA — 0 CVEs nuevos en el feed reciente
  • 🟡 MEDIA — 1 a 2 CVEs nuevos activamente explotados
  • 🟠 ALTA — 3 a 4 CVEs nuevos activamente explotados
  • 🔴 CRÍTICA — 5 o más CVEs nuevos activamente explotados

Fuente: CISA Known Exploited Vulnerabilities Catalog — actualizado cada hora.

14
CVEs añadidos este mes
1543
Total KEV catalogados
10
Vendors afectados
CVE Producto Criticidad Añadido
CVE-2025-47813 Wing FTP Server Wing FTP Server MEDIA 2026-03-16
CVE-2026-3910 Google Chromium V8 ALTA 2026-03-13
CVE-2026-3909 Google Skia ALTA 2026-03-13
CVE-2025-68613 n8n n8n CRÍTICA 2026-03-11
CVE-2021-22054 Omnissa Workspace One UEM ALTA 2026-03-09
CVE-2025-26399 SolarWinds Web Help Desk CRÍTICA 2026-03-09
CVE-2026-1603 Ivanti Endpoint Manager (EPM) ALTA 2026-03-09
CVE-2017-7921 Hikvision Multiple Products CRÍTICA 2026-03-05
CVE-2021-22681 Rockwell Multiple Products CRÍTICA 2026-03-05
CVE-2023-43000 Apple Multiple Products ALTA 2026-03-05
Microsoft
14
Apple
6
Google
5
Cisco
4
Fortinet
4
SolarWinds
3
Broadcom
3
SmarterTools
3
Gladinet
3
Ivanti
2
CVE ID Producto Descripción CVSS Añadido
CVE-2009-0563 Microsoft Office Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via a Word docum… ALTA 2022-06-08
CVE-2009-0557 Microsoft Office Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a … ALTA 2022-06-08
CVE-2008-0655 Adobe Acrobat and Reader Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a speciall… CRÍTICA 2022-06-08
CVE-2007-5659 Adobe Acrobat and Reader Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF… ALTA 2022-06-08
CVE-2006-2492 Microsoft Word Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code. ALTA 2022-06-08
CVE-2022-26134 Atlassian Confluence Server/Data Center Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenti… CRÍTICA 2022-06-02
CVE-2019-3010 Oracle Solaris Oracle Solaris component: XScreenSaver contains an unspecified vulnerability that allows for privilege escalation. ALTA 2022-05-25
CVE-2016-3393 Microsoft Windows A remote code execution vulnerability exists due to the way the Windows GDI component handles objects in the memory. An… ALTA 2022-05-25
CVE-2016-7256 Microsoft Windows A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedde… ALTA 2022-05-25
CVE-2016-1010 Adobe Flash Player and AIR Integer overflow vulnerability in Adobe Flash Player and AIR allows attackers to execute code. ALTA 2022-05-25
CVE-2016-0984 Adobe Flash Player and AIR Use-after-free vulnerability in Adobe Flash Player and Adobe AIR allows attackers to execute code. ALTA 2022-05-25
CVE-2016-0034 Microsoft Silverlight Microsoft Silverlight mishandles negative offsets during decoding, which allows attackers to execute remote code or cau… ALTA 2022-05-25
CVE-2015-0310 Adobe Flash Player Adobe Flash Player does not properly restrict discovery of memory addresses, which allows attackers to bypass the addre… ALTA 2022-05-25
CVE-2015-0016 Microsoft Windows Directory traversal vulnerability in the TS WebProxy (TSWbPrxy) component in Microsoft Windows allows remote attackers … ALTA 2022-05-25
CVE-2015-0071 Microsoft Internet Explorer Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection … MEDIA 2022-05-25
CVE-2015-2360 Microsoft Win32k Win32k.sys in the kernel-mode drivers in Microsoft Windows allows local users to gain privileges or cause denial-of-ser… ALTA 2022-05-25
CVE-2015-2425 Microsoft Internet Explorer Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or … ALTA 2022-05-25
CVE-2015-1769 Microsoft Windows A privilege escalation vulnerability exists when the Windows Mount Manager component improperly processes symbolic link… MEDIA 2022-05-25
CVE-2015-4495 Mozilla Firefox Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges. ALTA 2022-05-25
CVE-2015-8651 Adobe Flash Player Integer overflow in Adobe Flash Player allows attackers to execute code. ALTA 2022-05-25
CVE-2015-6175 Microsoft Windows The kernel in Microsoft Windows contains a vulnerability that allows local users to gain privileges via a crafted appli… ALTA 2022-05-25
CVE-2015-1671 Microsoft Windows A remote code execution vulnerability exists when components of Windows, .NET Framework, Office, Lync, and Silverlight … ALTA 2022-05-25
CVE-2014-4148 Microsoft Windows A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts. ALTA 2022-05-25
CVE-2014-8439 Adobe Flash Player Adobe Flash Player has a vulnerability in the way it handles a dereferenced memory pointer which could lead to code exe… ALTA 2022-05-25
CVE-2014-4123 Microsoft Internet Explorer Microsoft Internet Explorer contains an unspecified vulnerability that allows remote attackers to gain privileges via a… ALTA 2022-05-25
← Anterior Página 33 / 62 (1543 CVEs total) Siguiente →
[INFO] Las fallas de inteligencia artificial en Amazon Bedrock, LangSmith y SGLang permiten la exfiltración de datos y el RCE...  ·  [INFO] El ransomware LeakNet usa ClickFix a través de sitios pirateados e implementa el cargador en memoria Deno...  ·  [INFO] La IA está en todas partes, pero los CISO siguen protegiéndola con las habilidades y herramientas de ayer, según un estudio...  ·  [INFO] Konni implementa EndRAT mediante suplantación de identidad y usa KakaoTalk para propagar malware...  ·  [INFO] La CISA señala la vulnerabilidad Wing FTP explotada activamente que filtra las rutas de los servidores...  ·  [INFO] Las fallas de inteligencia artificial en Amazon Bedrock, LangSmith y SGLang permiten la exfiltración de datos y el RCE...  ·  [INFO] El ransomware LeakNet usa ClickFix a través de sitios pirateados e implementa el cargador en memoria Deno...  ·  [INFO] La IA está en todas partes, pero los CISO siguen protegiéndola con las habilidades y herramientas de ayer, según un estudio...  ·  [INFO] Konni implementa EndRAT mediante suplantación de identidad y usa KakaoTalk para propagar malware...  ·  [INFO] La CISA señala la vulnerabilidad Wing FTP explotada activamente que filtra las rutas de los servidores...  ·