Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2022-45786

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** There are issues with the AGE drivers for Golang and Python that enable SQL injections to occur. This impacts AGE for PostgreSQL 11 &amp; AGE for PostgreSQL 12, all versions up-to-and-including 1.1.0, when using those drivers.<br /> <br /> The fix is to update to the latest Golang and Python drivers in addition to the latest version of AGE that is used for PostgreSQL 11 or  PostgreSQL 12.<br /> <br /> The update of AGE will add a new function to enable parameterization of the cypher() function, which, in conjunction with the driver updates, will resolve this issue.<br /> <br /> Background (for those who want more information):<br /> <br /> After thoroughly researching this issue, we found that due to the nature of the cypher() function, it was not easy to parameterize the values passed into it. This enabled SQL injections, if the developer of the driver wasn&amp;#39;t careful. The developer of the Golang and Pyton drivers didn&amp;#39;t fully utilize parameterization, likely because of this, thus enabling SQL injections.<br /> <br /> The obvious fix to this issue is to use parameterization in the drivers for all PG SQL queries. However, parameterizing all PG queries is complicated by the fact that the cypher() function call itself cannot be parameterized directly, as it isn&amp;#39;t a real function. At least, not the parameters that would take the graph name and cypher query.<br /> <br /> The reason the cypher() function cannot have those values parameterized is because the function is a placeholder and never actually runs. The cypher() function node, created by PG in the query tree, is transformed and replaced with a query tree for the actual cypher query during the analyze phase. The problem is that parameters - that would be passed in and that the cypher() function transform needs to be resolved - are only resolved in the execution phase, which is much later. Since the transform of the cypher() function needs to know the graph name and cypher query prior to execution, they can&amp;#39;t be passed as parameters.<br /> <br /> The fix that we are testing right now, and are proposing to use, is to create a function that will be called prior to the execution of the cypher() function transform. This new function will allow values to be passed as parameters for the graph name and cypher query. As this command will be executed prior to the cypher() function transform, its values will be resolved. These values can then be cached for the immediately following cypher() function transform to use. As added features, the cached values will store the calling session&amp;#39;s pid, for validation. And, the cypher() function transform will clear this cached information after function invocation, regardless of whether it was used.<br /> <br /> This method will allow the parameterizing of the cypher() function indirectly and provide a way to lock out SQL injection attacks.
Gravedad CVSS v3.1: ALTA
Última modificación:
26/03/2025

CVE-2023-25193

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Gravedad CVSS v3.1: ALTA
Última modificación:
25/03/2025

CVE-2023-0677

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1.
Gravedad CVSS v3.1: MEDIA
Última modificación:
12/02/2023

CVE-2023-0678

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1.
Gravedad CVSS v3.1: MEDIA
Última modificación:
02/03/2023

CVE-2023-0676

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.
Gravedad CVSS v3.1: MEDIA
Última modificación:
13/02/2026

CVE-2023-0675

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as critical, was found in Calendar Event Management System 2.3.0. This affects an unknown part. The manipulation of the argument start/end leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220197 was assigned to this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
17/05/2024

CVE-2023-0673

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The associated identifier of this vulnerability is VDB-220195.
Gravedad CVSS v3.1: ALTA
Última modificación:
07/09/2024

CVE-2023-0674

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220196.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/05/2024

CVE-2018-25080

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER[&amp;#39;PHP_SELF&amp;#39;] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The identifier of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.
Gravedad CVSS v3.1: BAJA
Última modificación:
16/04/2025

CVE-2019-25101

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The patch is named f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/05/2024

CVE-2015-10072

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as problematic was found in NREL api-umbrella-web 0.7.1. This vulnerability affects unknown code of the component Flash Message Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.8.0 is able to address this issue. The name of the patch is bcc0e922c61d30367678c8f17a435950969315cd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-220060.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/05/2024

CVE-2018-25079

Fecha de publicación:
04/02/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in Segmentio is-url up to 1.2.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. Upgrading to version 1.2.3 is able to address this issue. The patch is identified as 149550935c63a98c11f27f694a7c4a9479e53794. It is recommended to upgrade the affected component. VDB-220058 is the identifier assigned to this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
17/05/2024