Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2023-36459

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 1.3 and prior to versions 3.5.9, 4.0.5, and 4.1.3, an attacker using carefully crafted oEmbed data can bypass the HTML sanitization performed by Mastodon and include arbitrary HTML in oEmbed preview cards. This introduces a vector for cross-site scripting (XSS) payloads that can be rendered in the user's browser when a preview card for a malicious link is clicked through. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
14/07/2023

CVE-2023-36456

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** authentik is an open-source Identity Provider. Prior to versions 2023.4.3 and 2023.5.5, authentik does not verify the source of the X-Forwarded-For and X-Real-IP headers, both in the Python code and the go code. Only authentik setups that are directly accessible by users without a reverse proxy are susceptible to this. Possible spoofing of IP addresses in logs, downstream applications proxied by (built in) outpost, IP bypassing in custom flows if used.<br /> <br /> This poses a possible security risk when someone has flows or policies that check the user&amp;#39;s IP address, e.g. when they want to ignore the user&amp;#39;s 2 factor authentication when the user is connected to the company network. A second security risk is that the IP addresses in the logfiles and user sessions are not reliable anymore. Anybody can spoof this address and one cannot verify that the user has logged in from the IP address that is in their account&amp;#39;s log. A third risk is that this header is passed on to the proxied application behind an outpost. The application may do any kind of verification, logging, blocking or rate limiting based on the IP address, and this IP address can be overridden by anybody that want to.<br /> <br /> Versions 2023.4.3 and 2023.5.5 contain a patch for this issue.<br />
Gravedad CVSS v3.1: ALTA
Última modificación:
13/07/2023

CVE-2023-3528

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in ThinuTech ThinuCMS 1.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /category.php. The manipulation of the argument cat_id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-233252.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/05/2024

CVE-2023-1298

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** ServiceNow has released upgrades and patches that address a Reflected Cross-Site scripting (XSS) vulnerability that was identified in the ServiceNow Polaris Layout. This vulnerability would enable an authenticated user to inject arbitrary scripts.<br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/12/2024

CVE-2023-37454

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c. NOTE: the suse.com reference has a different perspective about this.
Gravedad CVSS v3.1: MEDIA
Última modificación:
25/03/2024

CVE-2023-37453

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.
Gravedad CVSS v3.1: MEDIA
Última modificación:
05/05/2025

CVE-2023-34192

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
27/10/2025

CVE-2023-34193

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function.
Gravedad CVSS v3.1: ALTA
Última modificación:
12/07/2023

CVE-2023-36823

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in "relaxed" config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue. Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn&amp;#39;t allow `style` elements, using a Sanitize config that doesn&amp;#39;t allow CSS at-rules, or by manually escaping the character sequence `
Gravedad CVSS v3.1: MEDIA
Última modificación:
22/12/2023

CVE-2023-36830

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** SQLFluff is a SQL linter. Prior to version 2.1.2, in environments where untrusted users have access to the config files, there is a potential security vulnerability where those users could use the `library_path` config value to allow arbitrary python code to be executed via macros. For many users who use SQLFluff in the context of an environment where all users already have fairly escalated privileges, this may not be an issue - however in larger user bases, or where SQLFluff is bundled into another tool where developers still wish to give users access to supply their on rule configuration, this may be an issue.<br /> <br /> The 2.1.2 release offers the ability for the `library_path` argument to be overwritten on the command line by using the `--library-path` option. This overrides any values provided in the config files and effectively prevents this route of attack for users which have access to the config file, but not to the scripts which call the SQLFluff CLI directly. A similar option is provided for the Python API, where users also have a greater ability to further customise or override configuration as necessary. Unless `library_path` is explicitly required, SQLFluff maintainers recommend using the option `--library-path none` when invoking SQLFluff which will disable the `library-path` option entirely regardless of the options set in the configuration file or via inline config directives. As a workaround, limiting access to - or otherwise validating configuration files before they are ingested by SQLFluff will provides a similar effect and does not require upgrade.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/07/2023

CVE-2023-37260

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** league/oauth2-server is an implementation of an OAuth 2.0 authorization server written in PHP. Starting in version 8.3.2 and prior to version 8.5.3, servers that passed their keys to the CryptKey constructor as as string instead of a file path will have had that key included in a LogicException message if they did not provide a valid pass phrase for the key where required. This issue has been patched so that the provided key is no longer exposed in the exception message in the scenario outlined above. Users should upgrade to version 8.5.3 to receive the patch. As a workaround, pass the key as a file instead of a string.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/07/2023

CVE-2023-30321

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cross Site Scripting (XSS) vulnerability in textMessage field in /src/chatbotapp/LoginServlet.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
12/07/2023