Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-32695

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** socket.io parser is a socket.io encoder and decoder written in JavaScript complying with version 5 of socket.io-protocol. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. A patch has been released in version 4.2.3.<br /> <br />
Gravedad CVSS v3.1: ALTA
Última modificación:
05/06/2023

CVE-2023-2928

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in DedeCMS up to 5.7.106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/dede/article_allowurl_edit.php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230083.
Gravedad CVSS v3.1: ALTA
Última modificación:
17/05/2024

CVE-2023-2926

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in SeaCMS 11.6 and classified as problematic. This issue affects some unknown processing of the file member.php of the component Picture Upload Handler. The manipulation of the argument oldpic leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230081 was assigned to this vulnerability.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/05/2024

CVE-2023-2927

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in JIZHICMS 2.4.5. It has been classified as critical. Affected is the function index of the file TemplateController.php. The manipulation of the argument webapi leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230082 is the identifier assigned to this vulnerability.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/05/2024

CVE-2023-2925

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as problematic, was found in Webkul krayin crm 1.2.4. This affects an unknown part of the file /admin/contacts/organizations/edit/2 of the component Edit Person Page. The manipulation of the argument Organization leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230079. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/05/2024

CVE-2023-2924

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as critical, has been found in Supcon SimField up to 1.80.00.00. Affected by this issue is some unknown functionality of the file /admin/reportupload.aspx. The manipulation of the argument files[] leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230078 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/05/2024

CVE-2023-2923

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
17/05/2024

CVE-2023-2922

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as problematic has been found in SourceCodester Comment System 1.0. Affected is an unknown function of the file index.php of the component GET Parameter Handler. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230076.
Gravedad CVSS v3.1: MEDIA
Última modificación:
17/05/2024

CVE-2023-26127

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the &amp;#39;module.exports&amp;#39; function.<br /> <br /> **Note:**<br /> <br /> To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/01/2025

CVE-2023-26128

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function.<br /> <br /> **Note:**<br /> <br /> To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/01/2025

CVE-2023-26129

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the &amp;#39;check&amp;#39; function in the bwm-ng.js file. <br /> <br /> **Note:**<br /> <br /> To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
Gravedad CVSS v3.1: ALTA
Última modificación:
13/01/2025

CVE-2023-33184

Fecha de publicación:
27/05/2023
Idioma:
Inglés
*** Pendiente de traducción *** Nextcloud Mail is a mail app in Nextcloud. A blind SSRF attack allowed to send GET requests to services running in the same web server. It is recommended that the Mail app is update to version 3.02, 2.2.5 or 1.15.3.<br /> <br />
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/11/2024