Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-2924

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as critical, has been found in Supcon SimField up to 1.80.00.00. Affected by this issue is some unknown functionality of the file /admin/reportupload.aspx. The manipulation of the argument files[] leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230078 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/05/2024

CVE-2023-2923

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/05/2024

CVE-2023-2922

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as problematic has been found in SourceCodester Comment System 1.0. Affected is an unknown function of the file index.php of the component GET Parameter Handler. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230076.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/05/2024

CVE-2023-26127

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the &amp;#39;module.exports&amp;#39; function.<br /> <br /> **Note:**<br /> <br /> To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/01/2025

CVE-2023-26128

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function.<br /> <br /> **Note:**<br /> <br /> To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/01/2025

CVE-2023-26129

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the &amp;#39;check&amp;#39; function in the bwm-ng.js file. <br /> <br /> **Note:**<br /> <br /> To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/01/2025

CVE-2023-33184

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** Nextcloud Mail is a mail app in Nextcloud. A blind SSRF attack allowed to send GET requests to services running in the same web server. It is recommended that the Mail app is update to version 3.02, 2.2.5 or 1.15.3.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/11/2024

CVE-2023-32686

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded. The upload validation checks were not robust enough which left the possibility of an attacker to circumvent them and upload a potentially dangerous file. Exploiting this flaw, a combination of files could be uploaded so that they work together to circumvent the existing Content-Security-Policy and allow execution of arbitrary JavaScript in the browser. This issue has been patched in version 12.3.
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/06/2023

CVE-2023-33188

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** Omni-notes is an open source note-taking application for Android. The Omni-notes Android app had an insufficient path validation vulnerability when displaying the details of a note received through an externally-provided intent. The paths of the note&amp;#39;s attachments were not properly validated, allowing malicious or compromised applications in the same device to force Omni-notes to copy files from its internal storage to its external storage directory, where they would have become accessible to any component with permission to read the external storage. Updating to the newest version (6.2.7) of Omni-notes Android fixes this vulnerability.
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/06/2023

CVE-2023-33192

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** ntpd-rs is an NTP implementation written in Rust. ntpd-rs does not validate the length of NTS cookies in received NTP packets to the server. An attacker can crash the server by sending a specially crafted NTP packet containing a cookie shorter than what the server expects. The server also crashes when it is not configured to handle NTS packets. The issue was caused by improper slice indexing. The indexing operations were replaced by safer alternatives that do not crash the ntpd-rs server process but instead properly handle the error condition. A patch was released in version 0.3.3.
Gravedad CVSS v3.1: ALTA
Última modificación:
02/06/2023

CVE-2023-32688

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** parse-server-push-adapter is the official Push Notification adapter for Parse Server. The Parse Server Push Adapter can crash Parse Server due to an invalid push notification payload. This issue has been patched in version 4.1.3.<br />
Gravedad CVSS v3.1: ALTA
Última modificación:
02/06/2023

CVE-2023-33195

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** Craft is a CMS for creating custom digital experiences on the web. A malformed RSS feed can deliver an XSS payload. This issue was patched in version 4.4.6.<br /> <br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/06/2023