Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-25549

Publication date:
18/04/2023
<br /> <br /> <br /> <br /> <br /> <br /> <br /> A CWE-94: Improper Control of Generation of Code (&amp;#39;Code Injection&amp;#39;) vulnerability exists that<br /> allows for remote code execution when using a parameter of the DCE network settings<br /> endpoint. <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-25548

Publication date:
18/04/2023
<br /> A CWE-863: Incorrect Authorization vulnerability exists that could allow access to device<br /> credentials on specific DCE endpoints not being properly secured when a hacker is using a low<br /> privileged user. <br /> <br /> Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-25552

Publication date:
18/04/2023
<br /> <br /> <br /> A CWE-862: Missing Authorization vulnerability exists that could allow viewing of unauthorized<br /> content, changes or deleting of content, or performing unauthorized functions when tampering<br /> the Device File Transfer settings on DCE endpoints. <br /> <br /> <br /> <br /> Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-25555

Publication date:
18/04/2023
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> A CWE-78: Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS<br /> Command Injection&amp;#39;) vulnerability exists that could allow a user that knows the credentials to<br /> execute unprivileged shell commands on the appliance over SSH. <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-25554

Publication date:
18/04/2023
<br /> <br /> <br /> <br /> <br /> A CWE-78: Improper Neutralization of Special Elements used in an OS Command (&amp;#39;OS<br /> Command Injection&amp;#39;) vulnerability exists that allows a local privilege escalation on the appliance<br /> when a maliciously crafted Operating System command is entered on the device.<br /> <br /> <br /> <br /> <br /> <br /> Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-25553

Publication date:
18/04/2023
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> A CWE-79: Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site<br /> Scripting&amp;#39;) vulnerability exists on a DCE endpoint through the logging capabilities of the<br /> webserver. <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-25551

Publication date:
18/04/2023
<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> A CWE-79: Improper Neutralization of Input During Web Page Generation (&amp;#39;Cross-site<br /> Scripting&amp;#39;) vulnerability exists on a DCE file upload endpoint when tampering with parameters<br /> over HTTP.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-26048

Publication date:
18/04/2023
Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2023

CVE-2022-43378

Publication date:
18/04/2023
<br /> <br /> <br /> <br /> <br /> <br /> <br /> A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists that<br /> could cause the user to be tricked into performing unintended actions when external address<br /> frames are not properly restricted.<br /> <br /> <br /> <br /> <br /> <br /> Affected Products: NetBotz 4 - 355/450/455/550/570 (V4.7.0<br /> <br /> and prior)
Severity CVSS v4.0: Pending analysis
Last modification:
27/04/2023

CVE-2023-29887

Publication date:
18/04/2023
A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
06/02/2025

CVE-2023-21999

Publication date:
18/04/2023
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2023

CVE-2023-22002

Publication date:
18/04/2023
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
Severity CVSS v4.0: Pending analysis
Last modification:
20/04/2023