Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2024-56358

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** grist-core is a spreadsheet hosting server. A user visiting a malicious document and previewing an attachment could have their account compromised, because JavaScript in an SVG file would be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid previewing attachments in documents prepared by people they do not trust.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/12/2024

CVE-2024-56359

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/12/2024

CVE-2024-55509

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** SQL injection vulnerability in CodeAstro Complaint Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via the id parameter of the delete.php component.
Gravedad: Pendiente de análisis
Última modificación:
20/12/2024

CVE-2024-40875

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** There is a cross-site scripting vulnerability in the<br /> management console of Absolute Secure Access prior to version 13.52. Attackers<br /> with system administrator permissions can interfere with another system<br /> administrator’s use of the management console when the second administrator logs<br /> in. Attack complexity is high, attack requirements are present, privileges<br /> required are high, user interaction required is none. The impact to<br /> confidentiality is none, the impact to availability is low, and the impact to<br /> system integrity is high.
Gravedad CVSS v4.0: MEDIA
Última modificación:
20/12/2024

CVE-2024-12843

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability was found in Emlog Pro up to 2.4.1. It has been rated as problematic. This issue affects some unknown processing of the file /admin/plugin.php. The manipulation of the argument filter leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
20/12/2024

CVE-2024-12844

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.1. Affected is an unknown function of the file /admin/store.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
20/12/2024

CVE-2024-56330

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** Stardust is a platform for streaming isolated desktop containers. With this exploit, inter container communication (ICC) is not disabled. This would allow users within a container to access another containers agent, therefore compromising access.The problem has been patched in any Stardust build past 12/20/24. Users are advised to upgrade. Users may also manually disable ICC if they are unable to upgrade.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
20/12/2024

CVE-2024-56331

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** Uptime Kuma is an open source, self-hosted monitoring tool. An **Improper URL Handling Vulnerability** allows an attacker to access sensitive local files on the server by exploiting the `file:///` protocol. This vulnerability is triggered via the **"real-browser"** request type, which takes a screenshot of the URL provided by the attacker. By supplying local file paths, such as `file:///etc/passwd`, an attacker can read sensitive data from the server. This vulnerability arises because the system does not properly validate or sanitize the user input for the URL field. Specifically: 1. The URL input (``) allows users to input arbitrary file paths, including those using the `file:///` protocol, without server-side validation. 2. The server then uses the user-provided URL to make a request, passing it to a browser instance that performs the "real-browser" request, which takes a screenshot of the content at the given URL. If a local file path is entered (e.g., `file:///etc/passwd`), the browser fetches and captures the file’s content. Since the user input is not validated, an attacker can manipulate the URL to request local files (e.g., `file:///etc/passwd`), and the system will capture a screenshot of the file&amp;#39;s content, potentially exposing sensitive data. Any **authenticated user** who can submit a URL in "real-browser" mode is at risk of exposing sensitive data through screenshots of these files. This issue has been addressed in version 1.23.16 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/12/2024

CVE-2024-56333

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** Onyxia is a web app that aims at being the glue between multiple open source backend technologies to provide a state of art working environment for data scientists. This critical vulnerability allows authenticated users to remotely execute code within the Onyxia-API, leading to potential consequences such as unauthorized access to other user environments and denial of service attacks. This issue has been patched in api versions 4.2.0, 3.1.1, and 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
20/12/2024

CVE-2024-55341

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** A stored cross-site scripting (XSS) vulnerability in Piranha CMS 11.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by creating a page via the /manager/pages and then adding a markdown content with the XSS payload.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/12/2024

CVE-2024-56329

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** Socialstream is a third-party package for Laravel Jetstream. It replaces the published authentication and profile scaffolding provided by Laravel Jetstream, with scaffolding that has support for Laravel Socialite. When linking a social account to an already authenticated user, the lack of a confirmation step introduces a security risk. This is exacerbated if -&gt;stateless() is used in the Socialite configuration, bypassing state verification and making the exploit easier. Developers should ensure that users explicitly confirm account linking and avoid configurations that skip critical security checks. Socialstream v6.2 introduces a new custom route that requires a user to "Confirm" or "Deny" a request to link a social account. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Gravedad CVSS v4.0: ALTA
Última modificación:
20/12/2024

CVE-2024-12867

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** Server-Side Request Forgery in URL Mapper in Arctic Security&amp;#39;s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to exfiltrate and modify configurations and data.
Gravedad CVSS v4.0: ALTA
Última modificación:
20/12/2024