Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-29656

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** An improper authorization vulnerability in Darktrace mobile app (Android) prior to version 6.0.15 allows disabled and low-privilege users to control "antigena" actions(block/unblock traffic) from the mobile application. This vulnerability could create a "shutdown", blocking all ingress or egress traffic in the entire infrastructure where darktrace agents are deployed.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/07/2023

CVE-2023-3521

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cross-site Scripting (XSS) - Reflected in GitHub repository fossbilling/fossbilling prior to 0.5.4.
Gravedad CVSS v3.1: MEDIA
Última modificación:
10/07/2023

CVE-2023-3520

Fecha de publicación:
06/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository it-novum/openitcockpit prior to 4.6.6.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/07/2023

CVE-2023-36828

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Statamic is a flat-first, Laravel and Git powered content management system. Prior to version 4.10.0, the SVG tag does not sanitize malicious SVG. Therefore, an attacker can exploit this vulnerability to perform cross-site scripting attacks using SVG, even when using the `sanitize` function. Version 4.10.0 contains a patch for this issue.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/07/2023

CVE-2023-36827

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. A path traversal (directory traversal) vulnerability affects fides versions lower than version `2.15.1`, allowing remote attackers to access arbitrary files on the fides webserver container&amp;#39;s filesystem. The vulnerability is patched in fides `2.15.1`.<br /> <br /> If the Fides webserver API is not directly accessible to attackers and is instead deployed behind a reverse proxy as recommended in Ethyca&amp;#39;s security best practice documentation, and the reverse proxy is an AWS application load balancer, the vulnerability can&amp;#39;t be exploited by these attackers. An AWS application load balancer will reject this attack with a 400 error. Additionally, any secrets supplied to the container using environment variables rather than a `fides.toml` configuration file are not affected by this vulnerability.<br />
Gravedad CVSS v3.1: ALTA
Última modificación:
12/07/2023

CVE-2023-36822

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Uptime Kuma, a self-hosted monitoring tool, has a path traversal vulnerability in versions prior to 1.22.1. Uptime Kuma allows authenticated users to install plugins from an official list of plugins. This feature is currently disabled in the web interface, but the corresponding API endpoints are still available after login. Before a plugin is downloaded, the plugin installation directory is checked for existence. If it exists, it&amp;#39;s removed before the plugin installation. Because the plugin is not validated against the official list of plugins or sanitized, the check for existence and the removal of the plugin installation directory are prone to path traversal. This vulnerability allows an authenticated attacker to delete files from the server Uptime Kuma is running on. Depending on which files are deleted, Uptime Kuma or the whole system may become unavailable due to data loss.<br />
Gravedad CVSS v3.1: ALTA
Última modificación:
12/07/2023

CVE-2023-36809

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Kiwi TCMS, an open source test management system allows users to upload attachments to test plans, test cases, etc. Versions of Kiwi TCMS prior to 12.5 had introduced changes which were meant to serve all uploaded files as plain text in order to prevent browsers from executing potentially dangerous files when such files are accessed directly. The previous Nginx configuration was incorrect allowing certain browsers like Firefox to ignore the `Content-Type: text/plain` header on some occasions thus allowing potentially dangerous scripts to be executed. Additionally, file upload validators and parts of the HTML rendering code had been found to require additional sanitation and improvements. Version 12.5 fixes this vulnerability with updated Nginx content type configuration, improved file upload validation code to prevent more potentially dangerous uploads, and Sanitization of test plan names used in the `tree_view_html()` function.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/07/2023

CVE-2023-36821

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Uptime Kuma, a self-hosted monitoring tool, allows an authenticated attacker to install a maliciously crafted plugin in versions prior to 1.22.1, which may lead to remote code execution. Uptime Kuma allows authenticated users to install plugins from an official list of plugins. This feature is currently disabled in the web interface, but the corresponding API endpoints are still available after login. After downloading a plugin, it&amp;#39;s installed by calling `npm install` in the installation directory of the plugin. Because the plugin is not validated against the official list of plugins or installed with `npm install --ignore-scripts`, a maliciously crafted plugin taking advantage of npm scripts can gain remote code execution. Version 1.22.1 contains a patch for this issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
12/07/2023

CVE-2023-36813

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** Kanboard is project management software that focuses on the Kanban methodology. In versions prior to 1.2.31authenticated user is able to perform a SQL Injection, leading to a privilege escalation or loss of confidentiality. It appears that in some insert and update operations, the code improperly uses the PicoDB library to update/insert new information. Version 1.2.31 contains a fix for this issue.
Gravedad CVSS v3.1: ALTA
Última modificación:
10/04/2025

CVE-2023-36808

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.8, Computer Virtual Machine form and GLPI inventory request can be used to perform a SQL injection attack. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
10/07/2023

CVE-2023-30207

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** A divide by zero issue discovered in Kodi Home Theater Software 19.5 and earlier allows attackers to cause a denial of service via use of crafted mp3 file.
Gravedad CVSS v3.1: MEDIA
Última modificación:
23/01/2024

CVE-2023-36458

Fecha de publicación:
05/07/2023
Idioma:
Inglés
*** Pendiente de traducción *** 1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal. The vulnerability has been fixed in v1.3.6.
Gravedad CVSS v3.1: ALTA
Última modificación:
11/07/2023