Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-44393

Publication date:
09/10/2023
Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/10/2023

CVE-2022-35950

Publication date:
09/10/2023
OroCommerce is an open-source Business to Business Commerce application. In versions 4.1.0 through 4.1.13, 4.2.0 through 4.2.10, 5.0.0 prior to 5.0.11, and 5.1.0 prior to 5.1.1, the JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product. An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it. Versions 5.0.11 and 5.1.1 contain a fix for this issue.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2023

CVE-2023-25822

Publication date:
09/10/2023
ReportPortal is an AI-powered test automation platform. Prior to version 5.10.0 of the `com.epam.reportportal:service-api` module, corresponding to ReportPortal version 23.2, the ReportPortal database becomes unstable and reporting almost fully stops except for small launches with approximately 1 test inside when the test_item.path field is exceeded the allowable `ltree` field type indexing limit (path length&gt;=120, approximately recursive nesting of the nested steps). REINDEX INDEX path_gist_idx and path_idx aren&amp;#39;t helped. The problem was fixed in `com.epam.reportportal:service-api` module version 5.10.0 (product release 23.2), where the maximum number of nested elements were programmatically limited. A workaround is available. After deletion of the data with long paths, and reindexing both indexes (path_gist_idx and path_idx), the database becomes stable and ReportPortal works properly.
Severity CVSS v4.0: Pending analysis
Last modification:
13/10/2023

CVE-2023-36820

Publication date:
09/10/2023
Micronaut Security is a security solution for applications. Prior to versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1, IdTokenClaimsValidator skips `aud` claim validation if token is issued by same identity issuer/provider. Any OIDC setup using Micronaut where multiple OIDC applications exists for the same issuer but token auth are not meant to be shared. This issue has been patched in versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1.<br />
Severity CVSS v4.0: Pending analysis
Last modification:
13/10/2023

CVE-2023-41660

Publication date:
09/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in WPSynchro WP Synchro plugin
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-43643

Publication date:
09/10/2023
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy&amp;#39;s sanitized output. This issue has been patched in AntiSamy 1.7.4 and later.
Severity CVSS v4.0: Pending analysis
Last modification:
13/10/2023

CVE-2023-44378

Publication date:
09/10/2023
gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue without needing to change the calls to value comparison methods.
Severity CVSS v4.0: Pending analysis
Last modification:
13/10/2023

CVE-2023-43697

Publication date:
09/10/2023
<br /> Modification of Assumed-Immutable Data (MAID) in RDT400 in SICK APU allows an<br /> unprivileged remote attacker to make the site unable to load necessary strings via changing file paths<br /> using HTTP requests.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-43698

Publication date:
09/10/2023
<br /> Improper Neutralization of Input During Web Page Generation (’Cross-site Scripting’) in RDT400 in SICK APU allows an unprivileged remote attacker to run arbitrary code in the clients<br /> browser via injecting code into the website.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-5100

Publication date:
09/10/2023
<br /> Cleartext Transmission of Sensitive Information in RDT400 in SICK APU allows an<br /> unprivileged remote attacker to retrieve potentially sensitive information via intercepting network traffic<br /> that is not encrypted.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-5101

Publication date:
09/10/2023
<br /> Files or Directories Accessible to External Parties in RDT400 in SICK APU allows an<br /> unprivileged remote attacker to download various files from the server via HTTP requests.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-5102

Publication date:
09/10/2023
<br /> Insufficient Control Flow Management in RDT400 in SICK APU allows an unprivileged remote attacker to potentially enable hidden functionality via HTTP requests.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023