Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-32990

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.<br /> <br /> This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.<br /> <br /> Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
14/04/2026

CVE-2026-29146

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Padding Oracle vulnerability in Apache Tomcat&amp;#39;s EncryptInterceptor with default configuration.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.<br /> <br /> Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
14/04/2026

CVE-2026-29145

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.<br /> <br /> Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
14/04/2026

CVE-2026-29129

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Configured cipher preference order not preserved vulnerability in Apache Tomcat.<br /> <br /> This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.<br /> <br /> Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
14/04/2026

CVE-2026-25854

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Occasional URL redirection to untrusted Site (&amp;#39;Open Redirect&amp;#39;) vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.<br /> Other, unsupported versions may also be affected<br /> <br /> Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
14/04/2026

CVE-2026-29923

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** The pstrip64.sys driver in EnTech Taiwan PowerStrip
Gravedad CVSS v3.1: ALTA
Última modificación:
14/04/2026

CVE-2026-24880

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Inconsistent Interpretation of HTTP Requests (&amp;#39;HTTP Request/Response Smuggling&amp;#39;) vulnerability in Apache Tomcat via invalid chunk extension.<br /> <br /> This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.<br /> Other, unsupported versions may also be affected.<br /> <br /> Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
14/04/2026

CVE-2025-13926

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** An attacker could use data obtained by sniffing the network traffic to <br /> forge packets in order to make arbitrary requests to Contemporary <br /> Controls BASC 20T.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
13/04/2026

CVE-2026-35556

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** OpenPLC_V3 is vulnerable to a Plaintext Storage of a Password vulnerability that could allow an attacker to retrieve credentials and access sensitive information.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
13/04/2026

CVE-2026-35195

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime&amp;#39;s implementation of transcoding strings between components contains a bug where the return value of a guest component&amp;#39;s realloc is not validated before the host attempts to write through the pointer. This enables a guest to cause the host to write arbitrary transcoded string bytes to an arbitrary location up to 4GiB away from the base of linear memory. These writes on the host could hit unmapped memory or could corrupt host data structures depending on Wasmtime&amp;#39;s configuration. Wasmtime by default reserves 4GiB of virtual memory for a guest&amp;#39;s linear memory meaning that this bug will by default on hosts cause the host to hit unmapped memory and abort the process due to an unhandled fault. Wasmtime can be configured, however, to reserve less memory for a guest and to remove all guard pages, so some configurations of Wasmtime may lead to corruption of data outside of a guest&amp;#39;s linear memory, such as host data structures or other guests&amp;#39;s linear memories. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.
Gravedad CVSS v4.0: MEDIA
Última modificación:
15/04/2026

CVE-2026-35186

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime&amp;#39;s Winch compiler backend contains a bug where translating the table.grow operator causes the result to be incorrectly typed. For 32-bit tables this means that the result of the operator, internally in Winch, is tagged as a 64-bit value instead of a 32-bit value. This invalid internal representation of Winch&amp;#39;s compiler state compounds into further issues depending on how the value is consumed. The primary consequence of this bug is that bytes in the host&amp;#39;s address space can be stored/read from. This is only applicable to the 16 bytes before linear memory, however, as the only significant return value of table.grow that can be misinterpreted is -1. The bytes before linear memory are, by default, unmapped memory. Wasmtime will detect this fault and abort the process, however, because wasm should not be able to access these bytes. Overall this this bug in Winch represents a DoS vector by crashing the host process, a correctness issue within Winch, and a possible leak of up to 16-bytes before linear memory. Wasmtime&amp;#39;s default compiler is Cranelift, not Winch, and Wasmtime&amp;#39;s default settings are to place guard pages before linear memory. This means that Wasmtime&amp;#39;s default configuration is not affected by this issue, and when explicitly choosing Winch Wasmtime&amp;#39;s otherwise default configuration leads to a DoS. Disabling guard pages before linear memory is required to possibly leak up to 16-bytes of host data. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1.
Gravedad CVSS v4.0: MEDIA
Última modificación:
15/04/2026

CVE-2026-34988

Fecha de publicación:
09/04/2026
Idioma:
Inglés
*** Pendiente de traducción *** Wasmtime is a runtime for WebAssembly. From 28.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime&amp;#39;s implementation of its pooling allocator contains a bug where in certain configurations the contents of linear memory can be leaked from one instance to the next. The implementation of resetting the virtual memory permissions for linear memory used the wrong predicate to determine if resetting was necessary, where the compilation process used a different predicate. This divergence meant that the pooling allocator incorrectly deduced at runtime that resetting virtual memory permissions was not necessary while compile-time determine that virtual memory could be relied upon. The pooling allocator must be in use, Config::memory_guard_size configuration option must be 0, Config::memory_reservation configuration must be less than 4GiB, and pooling allocator must be configured with max_memory_size the same as the memory_reservation value in order to exploit this vulnerability. If all of these conditions are applicable then when a linear memory is reused the VM permissions of the previous iteration are not reset. This means that the compiled code, which is assuming out-of-bounds loads will segfault, will not actually segfault and can read the previous contents of linear memory if it was previously mapped. This represents a data leakage vulnerability between guest WebAssembly instances which breaks WebAssembly&amp;#39;s semantics and additionally breaks the sandbox that Wasmtime provides. Wasmtime is not vulnerable to this issue with its default settings, nor with the default settings of the pooling allocator, but embeddings are still allowed to configure these values to cause this vulnerability. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1.
Gravedad CVSS v4.0: BAJA
Última modificación:
15/04/2026