Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-4197

Publication date:
01/11/2023
Improper input validation in Dolibarr ERP CRM
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-5516

Publication date:
01/11/2023
<br /> Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing<br /> information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints,<br /> backend server, Internal IP. etc., which can potentially expose additional attack surface containing other interesting vulnerabilities. <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-2621

Publication date:
01/11/2023
<br /> The McFeeder server (distributed as part of SSW package), is susceptible to an arbitrary file write vulnerability on the MAIN computer<br /> system. This vulnerability stems from the use of an outdated version of a third-party library, which is used to extract archives uploaded to McFeeder server. An authenticated malicious client can<br /> exploit this vulnerability by uploading a crafted ZIP archive via the<br /> network to McFeeder’s service endpoint.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-2622

Publication date:
01/11/2023
<br /> Authenticated clients can read arbitrary files on the MAIN Computer<br /> system using the remote procedure call (RPC) of the InspectSetup<br /> service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-5514

Publication date:
01/11/2023
<br /> The response messages received from the eSOMS report generation using certain parameter queries with full file path can be<br /> abused for enumerating the local file system structure.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-5515

Publication date:
01/11/2023
<br /> The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against<br /> web servers and deployed web applications.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-5898

Publication date:
01/11/2023
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-5899

Publication date:
01/11/2023
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023

CVE-2023-5889

Publication date:
01/11/2023
Insufficient Session Expiration in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2023

CVE-2023-5890

Publication date:
01/11/2023
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2023

CVE-2023-5891

Publication date:
01/11/2023
Cross-site Scripting (XSS) - Reflected in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
Severity CVSS v4.0: Pending analysis
Last modification:
09/11/2023

CVE-2023-5892

Publication date:
01/11/2023
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2023