Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-1585

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later.
Gravedad CVSS v3.1: MEDIA
Última modificación:
01/05/2023

CVE-2023-30614

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Pay is a payments engine for Ruby on Rails 6.0 and higher. In versions prior to 6.3.2 a payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates Pay. This URL could be distributed via email to specifically target certain individuals. If the targeted application contains a functionality to submit user-generated content (such as comments) the attacker could even distribute the URL using that functionality. This has been patched in version 6.3.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Gravedad CVSS v3.1: MEDIA
Última modificación:
15/05/2023

CVE-2021-43819

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Stargate-Bukkit is a mod for the minecraft video game which adds a portal focused environment. In affected versions Minecarts with chests will drop their items when teleporting through a portal; when they reappear, they will still have their items impacting the integrity of the game world. The teleport code has since been rewritten and is available in release `0.11.5.1`. Users are advised to upgrade. There are no known workarounds for this issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
05/02/2025

CVE-2023-30610

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** aws-sigv4 is a rust library for low level request signing in the aws cloud platform. The `aws_sigv4::SigningParams` struct had a derived `Debug` implementation. When debug-formatted, it would include a user&amp;#39;s AWS access key, AWS secret key, and security token in plaintext. When TRACE-level logging is enabled for an SDK, `SigningParams` is printed, thereby revealing those credentials to anyone with access to logs. All users of the AWS SDK for Rust who enabled TRACE-level logging, either globally (e.g. `RUST_LOG=trace`), or for the `aws-sigv4` crate specifically are affected. This issue has been addressed in a set of new releases. Users are advised to upgrade. Users unable to upgrade should disable TRACE-level logging for AWS Rust SDK crates.<br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
05/02/2025

CVE-2023-30611

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Discourse-reactions is a plugin that allows user to add their reactions to the post in the Discourse messaging platform. In affected versions data about what reactions were performed on a post in a private topic could be leaked. This issue has been addressed in version 0.3. Users are advised to upgrade. Users unable to upgrade should disable the discourse-reactions plugin to fully mitigate the issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
05/02/2025

CVE-2023-30612

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability. Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only.
Gravedad CVSS v3.1: MEDIA
Última modificación:
01/05/2023

CVE-2023-22621

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
Gravedad CVSS v3.1: ALTA
Última modificación:
07/11/2025

CVE-2023-22893

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the &amp;#39;None&amp;#39; type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
Gravedad CVSS v3.1: ALTA
Última modificación:
07/11/2025

CVE-2023-22894

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/11/2025

CVE-2023-29586

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Code Sector TeraCopy 3.9.7 does not perform proper access validation on the source folder during a copy operation. This leads to Arbitrary File Read by allowing any user to copy any directory in the system to a directory they control. NOTE: the Supplier disputes this because only admin users can copy arbitrary folders, and because the 143984 reference is about a different concern (unrelated to directory copying) that was fixed in 3.5b.
Gravedad CVSS v3.1: MEDIA
Última modificación:
05/02/2025

CVE-2023-29923

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface.
Gravedad CVSS v3.1: MEDIA
Última modificación:
05/02/2025

CVE-2023-27777

Fecha de publicación:
19/04/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cross-site scripting (XSS) vulnerability was discovered in Online Jewelry Shop v1.0 that allows attackers to execute arbitrary script via a crafted URL.
Gravedad CVSS v3.1: MEDIA
Última modificación:
05/02/2025