Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-33653

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /Applications/Content%20Manager/Execute.aspx?cmd=convert&mode=HTML.
Gravedad CVSS v3.1: ALTA
Última modificación:
08/01/2025

CVE-2023-33651

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules.
Gravedad CVSS v3.1: ALTA
Última modificación:
08/01/2025

CVE-2023-33652

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /sitecore/shell/Invoke.aspx.
Gravedad CVSS v3.1: ALTA
Última modificación:
08/01/2025

CVE-2023-32682

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. In affected versions it may be possible for a deactivated user to login when using uncommon configurations. This only applies if any of the following are true: 1. JSON Web Tokens are enabled for login via the `jwt_config.enabled` configuration setting. 2. The local password database is enabled via the `password_config.enabled` and `password_config.localdb_enabled` configuration settings *and* a user's password is updated via an admin API after a user is deactivated. Note that the local password database is enabled by default, but it is uncommon to set a user's password after they've been deactivated. Installations that are configured to only allow login via Single Sign-On (SSO) via CAS, SAML or OpenID Connect (OIDC); or via an external password provider (e.g. LDAP) are not affected. If not using JSON Web Tokens, ensure that deactivated users do not have a password set. This issue has been addressed in version 1.85.0. Users are advised to upgrade.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/06/2023

CVE-2023-32683

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. A discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the limited information returned to the client: 1. For discovered oEmbed URLs, any non-JSON response or a JSON response which includes non-oEmbed information is discarded. 2. For discovered image URLs, any non-image response is discarded. Systems which have URL preview disabled (via the `url_preview_enabled` setting) or have not configured a `url_preview_url_blacklist` are not affected. This issue has been addressed in version 1.85.0. Users are advised to upgrade. User unable to upgrade may also disable URL previews.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/06/2023

CVE-2023-2183

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Grafana is an open-source platform for monitoring and observability. <br /> <br /> The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.<br /> <br /> This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.<br /> <br /> Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/02/2025

CVE-2023-2801

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Grafana is an open-source platform for monitoring and observability. <br /> <br /> Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.<br /> <br /> The only feature that uses mixed queries at the moment is public dashboards, but it&amp;#39;s also possible to cause this by calling the query API directly.<br /> <br /> This might enable malicious users to crash Grafana instances through that endpoint.<br /> <br /> Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/02/2025

CVE-2023-22833

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Palantir Foundry deployments running Lime2 versions between 2.519.0 and 2.532.0 were vulnerable a bug that allowed authenticated users within a Foundry organization to bypass discretionary or mandatory access controls under certain circumstances.
Gravedad CVSS v3.1: MEDIA
Última modificación:
07/11/2023

CVE-2023-34104

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.
Gravedad CVSS v3.1: ALTA
Última modificación:
22/01/2024

CVE-2023-33747

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** CloudPanel v2.2.2 allows attackers to execute a path traversal.
Gravedad CVSS v3.1: ALTA
Última modificación:
08/01/2025

CVE-2023-33613

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** axTLS v2.1.5 was discovered to contain a heap buffer overflow in the bi_import function in axtls-code/crypto/bigint.c. This vulnerability allows attackers to cause a Denial of Service (DoS) when parsing a private key.
Gravedad CVSS v3.1: MEDIA
Última modificación:
08/01/2025

CVE-2022-46165

Fecha de publicación:
06/06/2023
Idioma:
Inglés
*** Pendiente de traducción *** Syncthing is an open source, continuous file synchronization program. In versions prior to 1.23.5 a compromised instance with shared folders could sync malicious files which contain arbitrary HTML and JavaScript in the name. If the owner of another device looks over the shared folder settings and moves the mouse over the latest sync, a script could be executed to change settings for shared folders or add devices automatically. Additionally adding a new device with a malicious name could embed HTML or JavaScript inside parts of the page. As a result the webUI may be subject to a stored cross site scripting attack. This issue has been addressed in version 1.23.5. Users are advised to upgrade. Users unable to upgrade should avoid sharing folders with untrusted users.
Gravedad CVSS v3.1: MEDIA
Última modificación:
16/06/2023