Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2023-28432

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY`<br /> and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
Gravedad CVSS v3.1: ALTA
Última modificación:
24/10/2025

CVE-2023-28431

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** Frontier is an Ethereum compatibility layer for Substrate. Frontier&amp;#39;s `modexp` precompile uses `num-bigint` crate under the hood. In the implementation prior to pull request 1017, the cases for modulus being even and modulus being odd are treated separately. Odd modulus uses the fast Montgomery multiplication, and even modulus uses the slow plain power algorithm. This gas cost discrepancy was not accounted for in the `modexp` precompile, leading to possible denial of service attacks.<br /> <br /> No fixes for `num-bigint` are currently available, and thus this issue is fixed in the short term by raising the gas costs for even modulus, and in the long term fixing it in `num-bigint` or switching to another modexp implementation. The short-term fix for Frontier is deployed at pull request 1017. There are no known workarounds aside from applying the fix.
Gravedad CVSS v3.1: ALTA
Última modificación:
07/11/2023

CVE-2023-0386

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
Gravedad CVSS v3.1: ALTA
Última modificación:
04/11/2025

CVE-2023-28434

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
Gravedad CVSS v3.1: ALTA
Última modificación:
26/02/2026

CVE-2022-45003

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** Gophish through 0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted payload involving autofocus.
Gravedad CVSS v3.1: ALTA
Última modificación:
25/02/2025

CVE-2023-28119

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package&amp;#39;s use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.<br />
Gravedad CVSS v3.1: ALTA
Última modificación:
07/11/2023

CVE-2023-28117

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application.<br /> <br /> In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one&amp;#39;s Django settings; and one must not be configured in one&amp;#39;s organization or project settings to use Sentry&amp;#39;s data scrubbing features to account for the custom cookie names.<br /> <br /> As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one&amp;#39;s Django settings and will remove the values from the payload before sending the data to Sentry. As a workaround, use the SDK&amp;#39;s filtering mechanism to remove the cookies from the payload that is sent to Sentry. For error events, this can be done with the `before_send` callback method and for performance related events (transactions) one can use the `before_send_transaction` callback method. Those who want to handle filtering of these values on the server-side can also use Sentry&amp;#39;s advanced data scrubbing feature to account for the custom cookie names. Look for the `$http.cookies`, `$http.headers`, `$request.cookies`, or `$request.headers` fields to target with a scrubbing rule.
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/11/2023

CVE-2023-27224

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** An issue found in NginxProxyManager v.2.9.19 allows an attacker to execute arbitrary code via a lua script to the configuration file.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
25/02/2025

CVE-2023-28114

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** `cilium-cli` is the command line interface to install, manage, and troubleshoot Kubernetes clusters running Cilium. Prior to version 0.13.2,`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remote clusters. Users who have set up cluster meshes using the Cilium Helm chart are not affected by this issue.<br /> <br /> Due to an incorrect mount point specification, the settings specified by the `initContainer` that configures `etcd` users and their permissions are overwritten when using `cilium-cli` to configure a cluster mesh. An attacker who has already gained access to a valid key and certificate for an `etcd` cluster compromised in this manner could then modify state in that `etcd` cluster.<br /> <br /> This issue is patched in `cilium-cli` 0.13.2. As a workaround, one may use Cilium&amp;#39;s Helm charts to create their cluster.
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/11/2023

CVE-2023-0870

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization&amp;#39;s private networks and should not be directly accessible from the Internet.<br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/11/2023

CVE-2023-25820

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.
Gravedad CVSS v3.1: ALTA
Última modificación:
29/03/2023

CVE-2023-27754

Fecha de publicación:
22/03/2023
Idioma:
Inglés
*** Pendiente de traducción *** vox2mesh 1.0 has stack-overflow in main.cpp, this is stack-overflow caused by incorrect use of memcpy() funciton. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
Gravedad CVSS v3.1: MEDIA
Última modificación:
26/02/2025