Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-5100

Publication date:
09/10/2023
<br /> Cleartext Transmission of Sensitive Information in RDT400 in SICK APU allows an<br /> unprivileged remote attacker to retrieve potentially sensitive information via intercepting network traffic<br /> that is not encrypted.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-5101

Publication date:
09/10/2023
<br /> Files or Directories Accessible to External Parties in RDT400 in SICK APU allows an<br /> unprivileged remote attacker to download various files from the server via HTTP requests.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-5102

Publication date:
09/10/2023
<br /> Insufficient Control Flow Management in RDT400 in SICK APU allows an unprivileged remote attacker to potentially enable hidden functionality via HTTP requests.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-5103

Publication date:
09/10/2023
Improper Restriction of Rendered UI Layers or Frames in RDT400 in SICK APU allows an unprivileged remote attacker to potentially reveal sensitive information via tricking a user into<br /> clicking on an actionable item using an iframe.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-43696

Publication date:
09/10/2023
<br /> Improper Access Control in SICK APU allows an unprivileged remote attacker to<br /> download as well as upload arbitrary files via anonymous access to the FTP server.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-43699

Publication date:
09/10/2023
<br /> Improper Restriction of Excessive Authentication Attempts in RDT400 in SICK APU<br /> allows an unprivileged remote attacker to guess the password via trial-and-error as the login attempts<br /> are not limited.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-43700

Publication date:
09/10/2023
Missing Authorization in RDT400 in SICK APU allows an unprivileged remote attacker to modify data via HTTP requests that no not require authentication.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
11/10/2023

CVE-2023-45247

Publication date:
09/10/2023
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 36497, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169.
Severity CVSS v4.0: Pending analysis
Last modification:
02/01/2025

CVE-2023-45248

Publication date:
09/10/2023
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 36497, Acronis Cyber Protect 16 (Windows) before build 37391.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2024

CVE-2023-45612

Publication date:
09/10/2023
In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2023

CVE-2023-45613

Publication date:
09/10/2023
In JetBrains Ktor before 2.3.5 server certificates were not verified
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2023

CVE-2023-5330

Publication date:
09/10/2023
Mattermost fails to enforce a limit for the size of the cache entry for OpenGraph data allowing an attacker to send a specially crafted request to the /api/v4/opengraph filling the cache and turning the server unavailable.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
12/10/2023