{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T14:15:52.093","vulnerabilities":[{"cve":{"id":"CVE-2023-3512","sourceIdentifier":"cve-coordination@incibe.es","published":"2023-10-04T11:15:10.363","lastModified":"2024-11-21T08:17:25.680","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Relative path traversal vulnerability in Setelsa Security's ConacWin CB, in its 3.8.2.2 version and earlier, the exploitation of which could allow an attacker to perform an arbitrary download of files from the system via the \"Download file\" parameter."},{"lang":"es","value":"Vulnerabilidad relativa de path traversal en Setelsa Security's ConacWin CB, en su versión 3.8.2.2 y anteriores, cuya explotación podría permitir a un atacante realizar una descarga arbitraria de archivos del sistema a través del parámetro \"Descargar archivo\"."}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@incibe.es","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve-coordination@incibe.es","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:setelsa-security:conacwin:*:*:*:*:*:*:*:*","versionEndIncluding":"3.8.2.2","matchCriteriaId":"AECA3302-4A34-45AA-A68E-A8CDEC89526A"}]}]}],"references":[{"url":"https://https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin","source":"cve-coordination@incibe.es","tags":["Broken Link"]},{"url":"https://github.com/advisories/GHSA-v6jm-v768-76h2","source":"nvd@nist.gov","tags":["Third Party Advisory"]},{"url":"https://https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}}]}