Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-27163

Publication date:
14/06/2024
Toshiba printers will display the password of the admin user in clear-text and additional passwords when sending 2 specific HTTP requests to the internal API. An attacker stealing the cookie of an admin or abusing a XSS vulnerability can recover this password in clear-text and compromise the printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.<br /> https://www.toshibatec.com/contacts/products/ <br /> As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27160

Publication date:
14/06/2024
All the Toshiba printers contain a shell script using the same hardcoded key to encrypt logs. An attacker can decrypt the encrypted files using the hardcoded key. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.<br /> https://www.toshibatec.com/contacts/products/ <br /> As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27161

Publication date:
14/06/2024
all the Toshiba printers have programs containing a hardcoded key used to encrypt files. An attacker can decrypt the encrypted files using the hardcoded key. Insecure algorithm is used for the encryption. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.<br /> https://www.toshibatec.com/contacts/products/ <br /> As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27162

Publication date:
14/06/2024
Toshiba printers provide a web interface that will load the JavaScript file. The file contains insecure codes vulnerable to XSS and is loaded inside all the webpages provided by the printer. An attacker can steal the cookie of an admin user. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27159

Publication date:
14/06/2024
All the Toshiba printers contain a shell script using the same hardcoded key to encrypt logs. An attacker can decrypt the encrypted files using the hardcoded key. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.<br /> https://www.toshibatec.com/contacts/products/ <br /> As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27158

Publication date:
14/06/2024
All the Toshiba printers share the same hardcoded root password. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27157

Publication date:
14/06/2024
The sessions are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27155

Publication date:
14/06/2024
The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. The programs can be replaced by malicious programs by any local or remote attacker. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2024-27156

Publication date:
14/06/2024
The session cookies, used for authentication, are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024

CVE-2023-6492

Publication date:
14/06/2024
The Simple Sitemap – Create a Responsive HTML Sitemap plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.5.13. This is due to missing or incorrect nonce validation in the &amp;#39;admin_notices&amp;#39; hook found in class-settings.php. This makes it possible for unauthenticated attackers to reset the plugin options to a default state via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2024

CVE-2024-0892

Publication date:
14/06/2024
The Schema App Structured Data plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.0. This is due to missing or incorrect nonce validation on the MarkUpdate function. This makes it possible for unauthenticated attackers to update and delete post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2024

CVE-2024-27154

Publication date:
14/06/2024
Passwords are stored in clear-text logs. An attacker can retrieve passwords. As for the affected products/models/versions, see the reference URL.
Severity CVSS v4.0: Pending analysis
Last modification:
04/07/2024