CIBERPLANETA_
// threat_intelligence_dashboard

Dashboard de Amenazas

Vulnerabilidades activamente explotadas según el catálogo CISA KEV (Known Exploited Vulnerabilities)

¿Cómo se calcula el nivel de amenaza global?

El nivel de amenaza global mostrado en la barra de navegación se calcula en base al número de CVEs activamente explotados publicados en el catálogo CISA KEV (Known Exploited Vulnerabilities) durante las últimas horas:

  • 🟢 BAJA — 0 CVEs nuevos en el feed reciente
  • 🟡 MEDIA — 1 a 2 CVEs nuevos activamente explotados
  • 🟠 ALTA — 3 a 4 CVEs nuevos activamente explotados
  • 🔴 CRÍTICA — 5 o más CVEs nuevos activamente explotados

Fuente: CISA Known Exploited Vulnerabilities Catalog — actualizado cada hora.

14
CVEs añadidos este mes
1543
Total KEV catalogados
10
Vendors afectados
CVE Producto Criticidad Añadido
CVE-2025-47813 Wing FTP Server Wing FTP Server MEDIA 2026-03-16
CVE-2026-3910 Google Chromium V8 ALTA 2026-03-13
CVE-2026-3909 Google Skia ALTA 2026-03-13
CVE-2025-68613 n8n n8n CRÍTICA 2026-03-11
CVE-2021-22054 Omnissa Workspace One UEM ALTA 2026-03-09
CVE-2025-26399 SolarWinds Web Help Desk CRÍTICA 2026-03-09
CVE-2026-1603 Ivanti Endpoint Manager (EPM) ALTA 2026-03-09
CVE-2017-7921 Hikvision Multiple Products CRÍTICA 2026-03-05
CVE-2021-22681 Rockwell Multiple Products CRÍTICA 2026-03-05
CVE-2023-43000 Apple Multiple Products ALTA 2026-03-05
Microsoft
14
Apple
6
Google
5
Cisco
4
Fortinet
4
SolarWinds
3
Broadcom
3
SmarterTools
3
Gladinet
3
Ivanti
2
CVE ID Producto Descripción CVSS Añadido
CVE-2022-1364 Google Chromium V8 Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit … ALTA 2022-04-15
CVE-2019-3929 Crestron Multiple Products Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unaut… CRÍTICA 2022-04-15
CVE-2019-16057 D-Link DNS-320 Storage Device The login_mgr.cgi script in D-Link DNS-320 is vulnerable to remote code execution. CRÍTICA 2022-04-15
CVE-2018-7841 Schneider Electric U.motion Builder A SQL Injection vulnerability exists in U.motion Builder software which could cause unwanted code execution when an imp… CRÍTICA 2022-04-15
CVE-2016-4523 Trihedral VTScada (formerly VTS) The WAP interface in Trihedral VTScada (formerly VTS) allows remote attackers to cause a denial-of-service (DoS). ALTA 2022-04-15
CVE-2014-0780 InduSoft Web Studio InduSoft Web Studio NTWebServer contains a directory traversal vulnerability that allows remote attackers to read admin… CRÍTICA 2022-04-15
CVE-2010-5330 Ubiquiti AirOS Certain Ubiquiti devices contain a command injection vulnerability via a GET request to stainfo.cgi. CRÍTICA 2022-04-15
CVE-2007-3010 Alcatel OmniPCX Enterprise masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server allows remote attackers to… CRÍTICA 2022-04-15
CVE-2022-22954 VMware Workspace ONE Access and Identity Manager VMware Workspace ONE Access and Identity Manager allow for remote code execution due to server-side template injection. CRÍTICA 2022-04-14
CVE-2022-24521 Microsoft Windows Microsoft Windows Common Log File System (CLFS) Driver contains an unspecified vulnerability that allows for privilege … ALTA 2022-04-13
CVE-2018-7602 Drupal Core A remote code execution vulnerability exists within multiple subsystems of Drupal that can allow attackers to exploit m… CRÍTICA 2022-04-13
CVE-2018-20753 Kaseya Virtual System/Server Administrator (VSA) Kaseya VSA RMM allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. CRÍTICA 2022-04-13
CVE-2015-5123 Adobe Flash Player Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player a… CRÍTICA 2022-04-13
CVE-2015-5122 Adobe Flash Player Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Playe… CRÍTICA 2022-04-13
CVE-2015-3113 Adobe Flash Player Heap-based buffer overflow vulnerability in Adobe Flash Player allows remote attackers to execute code. CRÍTICA 2022-04-13
CVE-2015-2502 Microsoft Internet Explorer Microsoft Internet Explorer contains a memory corruption vulnerability that allows an attacker to execute code or cause… ALTA 2022-04-13
CVE-2015-0313 Adobe Flash Player Use-after-free vulnerability in Adobe Flash Player allows remote attackers to execute code. CRÍTICA 2022-04-13
CVE-2015-0311 Adobe Flash Player Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute code. CRÍTICA 2022-04-13
CVE-2014-9163 Adobe Flash Player Stack-based buffer overflow in Adobe Flash Player allows attackers to execute code remotely. ALTA 2022-04-13
CVE-2022-23176 WatchGuard Firebox and XTM WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a… ALTA 2022-04-11
CVE-2021-42287 Microsoft Active Directory Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation. ALTA 2022-04-11
CVE-2021-42278 Microsoft Active Directory Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation. ALTA 2022-04-11
CVE-2021-39793 Google Pixel Google Pixel contains a possible out-of-bounds write due to a logic error in the code that could lead to local escalati… ALTA 2022-04-11
CVE-2021-27852 Checkbox Checkbox Survey Deserialization of Untrusted Data vulnerability in CheckboxWeb.dll of Checkbox Survey allows an unauthenticated remote … CRÍTICA 2022-04-11
CVE-2021-22600 Linux Kernel Linux Kernel contains a flaw in the packet socket (AF_PACKET) implementation which could lead to incorrectly freeing me… MEDIA 2022-04-11
← Anterior Página 37 / 62 (1543 CVEs total) Siguiente →
[INFO] Una falla crítica de Telnetd sin parches (CVE-2026-32746) permite la RCE raíz no autenticada a través del puerto 23...  ·  [INFO] Apple corrige la vulnerabilidad de WebKit que permite eludir políticas del mismo origen en iOS y macOS...  ·  [INFO] Las fallas de inteligencia artificial en Amazon Bedrock, LangSmith y SGLang permiten la exfiltración de datos y el RCE...  ·  [INFO] El ransomware LeakNet usa ClickFix a través de sitios pirateados e implementa el cargador en memoria Deno...  ·  [INFO] La IA está en todas partes, pero los CISO siguen protegiéndola con las habilidades y herramientas de ayer, según un estudio...  ·  [INFO] Una falla crítica de Telnetd sin parches (CVE-2026-32746) permite la RCE raíz no autenticada a través del puerto 23...  ·  [INFO] Apple corrige la vulnerabilidad de WebKit que permite eludir políticas del mismo origen en iOS y macOS...  ·  [INFO] Las fallas de inteligencia artificial en Amazon Bedrock, LangSmith y SGLang permiten la exfiltración de datos y el RCE...  ·  [INFO] El ransomware LeakNet usa ClickFix a través de sitios pirateados e implementa el cargador en memoria Deno...  ·  [INFO] La IA está en todas partes, pero los CISO siguen protegiéndola con las habilidades y herramientas de ayer, según un estudio...  ·