Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-2586

Publication date:
22/05/2023
<br /> Teltonika’s Remote Management System versions 4.14.0 is vulnerable to an unauthorized attacker registering previously unregistered devices through the RMS platform. If the user has not disabled the "RMS management feature" enabled by default, then an attacker could register that device to themselves. This could enable the attacker to perform different operations on the user&amp;#39;s devices, including remote code execution with &amp;#39;root&amp;#39; privileges (using the &amp;#39;Task Manager&amp;#39; feature on RMS).<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2023-2588

Publication date:
22/05/2023
<br /> Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2023-25447

Publication date:
22/05/2023
Cross-Site Request Forgery (CSRF) vulnerability in Inkthemescom ColorWay theme
Severity CVSS v4.0: Pending analysis
Last modification:
26/05/2023

CVE-2023-25448

Publication date:
22/05/2023
Cross-Site Request Forgery (CSRF) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin
Severity CVSS v4.0: Pending analysis
Last modification:
26/05/2023

CVE-2023-32346

Publication date:
22/05/2023
<br /> Teltonika’s Remote Management System versions prior to 4.10.0 contain a function that allows users to claim their devices. This function returns information based on whether the serial number of a device has already been claimed, the MAC address of a device has already been claimed, or whether the attempt to claim a device was successful. An attacker could exploit this to create a list of the serial numbers and MAC addresses of all devices cloud-connected to the Remote Management System.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2023-32347

Publication date:
22/05/2023
<br /> Teltonika’s Remote Management System versions prior to 4.10.0 use device serial numbers and MAC addresses to identify devices from the user perspective for device claiming and from the device perspective for authentication. If an attacker obtained the serial number and MAC address of a device, they could authenticate as that device and steal communication credentials of the device. This could allow an attacker to enable arbitrary command execution as root by utilizing management options within the newly registered devices.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
31/05/2023

CVE-2023-31923

Publication date:
22/05/2023
Suprema BioStar 2 before 2022 Q4, v2.9.1 has Insecure Permissions. A vulnerability in the web application allows an authenticated attacker with "User Operator" privileges to create a highly privileged user account. The vulnerability is caused by missing server-side validation, which can be exploited to gain full administrator privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
01/06/2023

CVE-2022-46680

Publication date:
22/05/2023
<br /> A CWE-319: Cleartext transmission of sensitive information vulnerability exists that could<br /> cause disclosure of sensitive information, denial of service, or modification of data if an attacker<br /> is able to intercept network traffic. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2023

CVE-2023-31453

Publication date:
22/05/2023
Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. The attacker can delete others&amp;#39; subscriptions, even if they are not the owner<br /> of the deleted subscription. Users are advised to upgrade to Apache InLong&amp;#39;s 1.7.0 or cherry-pick [1] to solve it.<br /> <br /> [1] <br /> <br /> https://github.com/apache/inlong/pull/7949 https://github.com/apache/inlong/pull/7949 <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2023-31454

Publication date:
22/05/2023
Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. <br /> <br /> The attacker can bind any cluster, even if he is not the cluster owner. Users are advised to upgrade to Apache InLong&amp;#39;s 1.7.0 or cherry-pick [1] to solve it.[1]<br /> <br /> https://github.com/apache/inlong/pull/7947 https://github.com/apache/inlong/pull/7947 <br /> <br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
09/10/2024

CVE-2023-31206

Publication date:
22/05/2023
Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Attackers can change the immutable name and type of nodes of InLong. Users are advised to upgrade to Apache InLong&amp;#39;s 1.7.0 or cherry-pick [1] to solve it.<br /> <br /> [1] https://cveprocess.apache.org/cve5/[1]%C2%A0https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024

CVE-2023-31058

Publication date:
22/05/2023
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Attackers would bypass the<br /> &amp;#39;autoDeserialize&amp;#39; option filtering by adding blanks. Users are advised to upgrade to Apache InLong&amp;#39;s 1.7.0 or cherry-pick <br /> <br /> https://github.com/apache/inlong/pull/7674 https://github.com/apache/inlong/pull/7674 to solve it.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2024