Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-29464

Publication date:
13/10/2023
<br /> FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/10/2023

CVE-2023-39960

Publication date:
13/10/2023
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available.
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2023-45107

Publication date:
13/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in GoodBarber plugin
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2023

CVE-2023-45108

Publication date:
13/10/2023
Cross-Site Request Forgery (CSRF) vulnerability in Mailrelay plugin
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2023

CVE-2023-45130

Publication date:
13/10/2023
Frontier is Substrate&amp;#39;s Ethereum compatibility layer. Prior to commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, at the end of a contract execution, when opcode SUICIDE marks a contract to be deleted, the software uses `storage::remove_prefix` (now renamed to `storage::clear_prefix`) to remove all storages associated with it. This is a single IO primitive call passing the WebAssembly boundary. For large contracts, the call (without providing a `limit` parameter) can be slow. In addition, for parachains, all storages to be deleted will be part of the PoV, which easily exceed relay chain PoV size limit. On the other hand, Frontier&amp;#39;s maintainers only charge a fixed cost for opcode SUICIDE. The maintainers consider the severity of this issue high, because an attacker can craft a contract with a lot of storage values on a parachain, and then call opcode SUICIDE on the contract. If the transaction makes into a parachain block, the parachain will then stall because the PoV size will exceed relay chain&amp;#39;s limit. This is especially an issue for XCM transactions, because they can&amp;#39;t be skipped. Commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contains a patch for this issue. For parachains, it&amp;#39;s recommended to issue an emergency runtime upgrade as soon as possible. For standalone chains, the impact is less severe because the issue mainly affects PoV sizes. It&amp;#39;s recommended to issue a normal runtime upgrade as soon as possible. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2023

CVE-2023-45162

Publication date:
13/10/2023
Affected 1E Platform versions have a Blind SQL Injection vulnerability that can lead to arbitrary code execution. <br /> <br /> Application of the relevant hotfix remediates this issue.<br /> <br /> for v8.1.2 apply hotfix Q23166<br /> for v8.4.1 apply hotfix Q23164<br /> for v9.0.1 apply hotfix Q23169<br /> <br /> SaaS implementations on v23.7.1 will automatically have hotfix Q23173 applied. Customers with SaaS versions below this are urged to upgrade urgently - please contact 1E to arrange this
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2025

CVE-2023-45463

Publication date:
13/10/2023
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the hostName parameter in the FUN_0040dabc function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Severity CVSS v4.0: Pending analysis
Last modification:
15/10/2024

CVE-2023-43079

Publication date:
13/10/2023
<br /> Dell OpenManage Server Administrator, versions 11.0.0.0 and prior, contains an Improper Access Control vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to execute arbitrary code in order to elevate privileges on the system. Exploitation may lead to a complete system compromise.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
20/10/2023

CVE-2023-39999

Publication date:
13/10/2023
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2024

CVE-2023-5571

Publication date:
13/10/2023
Improper Input Validation in GitHub repository vriteio/vrite prior to 0.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2023

CVE-2023-5572

Publication date:
13/10/2023
Server-Side Request Forgery (SSRF) in GitHub repository vriteio/vrite prior to 0.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2023

CVE-2023-5573

Publication date:
13/10/2023
Allocation of Resources Without Limits or Throttling in GitHub repository vriteio/vrite prior to 0.3.0.
Severity CVSS v4.0: Pending analysis
Last modification:
17/10/2023