Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2024-11607

Fecha de publicación:
21/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** The GTPayment Donations WordPress plugin through 1.0.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
Gravedad: Pendiente de análisis
Última modificación:
21/12/2024

CVE-2024-11349

Fecha de publicación:
21/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.1.6. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the sb_login_user_with_otp_fun() function. This makes it possible for unauthenticated attackers to log in as arbitrary users, including administrators.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
21/12/2024

CVE-2024-12846

Fecha de publicación:
21/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
21/12/2024

CVE-2023-31279

Fecha de publicación:
21/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered <br /> devices on the AirVantage platform when the owner has not disabled the AirVantage Management <br /> Service on the devices or registered the device. This could enable an attacker to configure, manage, <br /> and execute AT commands on an unsuspecting user’s devices.
Gravedad CVSS v3.1: ALTA
Última modificación:
21/12/2024

CVE-2023-31280

Fecha de publicación:
21/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** An AirVantage online Warranty Checker tool vulnerability could allow an attacker to <br /> perform bulk enumeration of IMEI and Serial Numbers pairs. The AirVantage Warranty Checker is updated to no longer return the IMEI and Serial <br /> Number in addition to the warranty status when the Serial Number or IMEI is used to look up <br /> warranty status.
Gravedad CVSS v3.1: MEDIA
Última modificación:
21/12/2024

CVE-2024-11811

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** The Feedify – Web Push Notifications plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the &amp;#39;platform&amp;#39;, &amp;#39;phone&amp;#39;, &amp;#39;email&amp;#39;, and &amp;#39;store_url&amp;#39; parameters. in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Gravedad CVSS v3.1: MEDIA
Última modificación:
20/12/2024

CVE-2021-40959

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** A reflected cross-site scripting vulnerability in MONITORAPP Application Insight Web Application Firewall (AIWAF)
Gravedad: Pendiente de análisis
Última modificación:
20/12/2024

CVE-2024-12845

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability classified as problematic was found in Emlog Pro up to 2.4.1. Affected by this vulnerability is an unknown functionality in the library /include/lib/common.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Gravedad CVSS v4.0: MEDIA
Última modificación:
20/12/2024

CVE-2020-13712

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** A command injection is possible through the user interface, allowing arbitrary command execution as <br /> the root user. oMG2000 running MGOS 3.15.1 or earlier is affected. <br /> <br /> MG90 running MGOS 4.2.1 or earlier is affected.
Gravedad: Pendiente de análisis
Última modificación:
20/12/2024

CVE-2024-56334

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/12/2024

CVE-2024-56335

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. In affected versions an attacker is capable of updating or deleting groups from an organization given a few conditions: 1. The attacker has a user account in the server. 2. The attacker&amp;#39;s account has admin or owner permissions in an unrelated organization. 3. The attacker knows the target organization&amp;#39;s UUID and the target group&amp;#39;s UUID. Note that this vulnerability is related to group functionality and as such is only applicable for servers who have enabled the `ORG_GROUPS_ENABLED` setting, which is disabled by default. This attack can lead to different situations: 1. Denial of service, the attacker can limit users from accessing the organization&amp;#39;s data by removing their membership from the group. 2. Privilege escalation, if the attacker is part of the victim organization, they can escalate their own privileges by joining a group they wouldn&amp;#39;t normally have access to. For attackers that aren&amp;#39;t part of the organization, this shouldn&amp;#39;t lead to any possible plain-text data exfiltration as all the data is encrypted client side. This vulnerability is patched in Vaultwarden `1.32.7`, and users are recommended to update as soon as possible. If it&amp;#39;s not possible to update to `1.32.7`, some possible workarounds are: 1. Disabling `ORG_GROUPS_ENABLED`, which would disable groups functionality on the server. 2. Disabling `SIGNUPS_ALLOWED`, which would not allow an attacker to create new accounts on the server.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/12/2024

CVE-2024-56357

Fecha de publicación:
20/12/2024
Idioma:
Inglés
*** Pendiente de traducción *** grist-core is a spreadsheet hosting server. A user visiting a malicious document or submitting a malicious form could have their account compromised, because it was possible to use the `javascript:` scheme with custom widget URLs and form redirect URLs. This issue has been patched in version 1.3.1. Users are advised to upgrade. Users unable to upgrade should avoid visiting documents or forms prepared by people they do not trust.
Gravedad CVSS v3.1: ALTA
Última modificación:
20/12/2024