Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-4143

Fecha de publicación:
01/05/2025
Idioma:
Inglés
*** Pendiente de traducción *** The OAuth implementation in workers-oauth-provider that is part of MCP framework https://github.com/cloudflare/workers-mcp , did not correctly validate that redirect_uri was on the allowed list of redirect URIs for the given client registration.<br /> <br /> Fixed in:  https://github.com/cloudflare/workers-oauth-provider/pull/26 https://github.com/cloudflare/workers-oauth-provider/pull/26 <br /> <br /> Impact:<br /> <br /> <br /> <br /> Under certain circumstances (see below), if a victim had previously authorized with a server built on workers-oath-provider, and an attacker could later trick the victim into visiting a malicious web site, then attacker could potentially steal the victim&amp;#39;s credentials to the same OAuth server and subsequently impersonate them.<br /> <br /> In order for the attack to be possible, the OAuth server&amp;#39;s authorized callback must be designed to auto-approve authorizations that appear to come from an OAuth client that the victim has authorized previously. The authorization flow is not implemented by workers-oauth-provider; it is up to the application built on top to decide whether to implement such automatic re-authorization. However, many applications do implement such logic.<br /> <br /> Note: It is a basic, well-known requirement that OAuth servers should verify that the redirect URI is among the allowed list for the client, both during the authorization flow and subsequently when exchanging the authorization code for an access token. workers-oauth-provider implemented only the latter check, not the former. Unfortunately, the former is the much more important check. Readers who are familiar with OAuth may recognize that failing to check redirect URIs against the allowed list is a well-known, basic mistake, covered extensively in the RFC and elsewhere. The author of this library would like everyone to know that he was, in fact, well-aware of this requirement, thought about it a lot while designing the library, and then, somehow, forgot to actually make sure the check was in the code. That is, it&amp;#39;s not that he didn&amp;#39;t know what he was doing, it&amp;#39;s that he knew what he was doing but flubbed it.
Gravedad CVSS v4.0: MEDIA
Última modificación:
01/05/2025

CVE-2025-4144

Fecha de publicación:
01/05/2025
Idioma:
Inglés
*** Pendiente de traducción *** PKCE was implemented in the OAuth implementation in workers-oauth-provider that is part of MCP framework https://github.com/cloudflare/workers-mcp . However, it was found that an attacker could cause the check to be skipped.<br /> <br /> <br /> Fixed in:<br /> <br /> <br /> <br /> https://github.com/cloudflare/workers-oauth-provider/pull/27 https://github.com/cloudflare/workers-oauth-provider/pull/27 <br /> <br /> <br /> Impact: <br /> <br /> PKCE is a defense-in-depth mechanism against certain kinds of attacks and was an optional extension in OAuth 2.0 which became required in the OAuth 2.1 draft. (Note that the MCP specification requires OAuth 2.1.). This bug completely bypasses PKCE protection.
Gravedad CVSS v4.0: MEDIA
Última modificación:
01/05/2025

CVE-2025-4145

Fecha de publicación:
01/05/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as critical, has been found in Netgear EX6200 1.0.3.94. This issue affects the function sub_3D0BC. The manipulation of the argument host leads to buffer overflow. The attack may be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: ALTA
Última modificación:
01/05/2025

CVE-2025-4142

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability has been found in Netgear EX6200 1.0.3.94 and classified as critical. This vulnerability affects the function sub_3C8EC. The manipulation of the argument host leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: ALTA
Última modificación:
30/04/2025

CVE-2025-4140

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as critical, has been found in Netgear EX6120 1.0.3.94. Affected by this issue is the function sub_30394. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: ALTA
Última modificación:
30/04/2025

CVE-2025-4141

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as critical, was found in Netgear EX6200 1.0.3.94. This affects the function sub_3C03C. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v4.0: ALTA
Última modificación:
30/04/2025

CVE-2023-37535

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** Insufficient URI protocol whitelist in HCL Domino Volt and Domino Leap<br /> allow script injection through query parameters.
Gravedad CVSS v3.1: ALTA
Última modificación:
30/04/2025

CVE-2023-45721

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** Insufficient default configuration in HCL Leap<br /> allows anonymous access to directory information.
Gravedad CVSS v3.1: MEDIA
Última modificación:
30/04/2025

CVE-2023-4533

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. It was assigned as a duplicate of CVE-2023-52440
Gravedad: Pendiente de análisis
Última modificación:
30/04/2025

CVE-2024-30115

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** Insufficient sanitization policy in HCL Leap<br /> allows client-side script injection in the deployed application through the<br /> HTML widget.
Gravedad CVSS v3.1: MEDIA
Última modificación:
30/04/2025

CVE-2024-30145

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** Multiple vectors in HCL Domino Volt and Domino Leap allow client-side<br /> script injection in the authoring environment and deployed applications.
Gravedad CVSS v3.1: MEDIA
Última modificación:
30/04/2025

CVE-2024-30146

Fecha de publicación:
30/04/2025
Idioma:
Inglés
*** Pendiente de traducción *** Improper access control of endpoint in HCL Domino Leap<br /> allows certain admin users to import applications from the<br /> server&amp;#39;s filesystem.
Gravedad CVSS v3.1: MEDIA
Última modificación:
30/04/2025