Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-40661

Publication date:
31/10/2022
A remote, unauthenticated, directory traversal vulnerability was identified within the web interface used by IND780 Advanced Weighing Terminals Build 8.0.07 March 19, 2018 (SS Label 'IND780_8.0.07'), Version 7.2.10 June 18, 2012 (SS Label 'IND780_7.2.10'). It was possible to traverse the folders of the affected host by providing a traversal path to the 'webpage' parameter in AutoCE.ini This could allow a remote unauthenticated adversary to access additional files on the affected system. This could also allow the adversary to perform further enumeration against the affected host to identify the versions of the systems in use, in order to launch further attacks in future.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2025

CVE-2022-37623

Publication date:
31/10/2022
Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the shimPath variable in resolve-shims.js.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-37620

Publication date:
31/10/2022
A Regular Expression Denial of Service (ReDoS) flaw was found in kangax html-minifier 4.0.0 because of the reCustomIgnore regular expression.
Severity CVSS v4.0: Pending analysis
Last modification:
01/06/2025

CVE-2022-3765

Publication date:
31/10/2022
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.8.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2022

CVE-2022-3766

Publication date:
31/10/2022
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.8.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2026

CVE-2022-40739

Publication date:
31/10/2022
Ragic report generation page has insufficient filtering for special characters. A remote attacker with general user privilege can inject JavaScript to perform XSS (Reflected Cross-Site Scripting) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2022

CVE-2022-40741

Publication date:
31/10/2022
Mail SQR Expert’s specific function has insufficient filtering for special characters. An unauthenticated remote attacker can exploit this vulnerability to perform arbitrary system command and disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2022

CVE-2022-40742

Publication date:
31/10/2022
Mail SQR Expert system has a Local File Inclusion vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary PHP file with .asp file extension under specific system paths, to access and modify partial system information but does not affect service availability.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-39022

Publication date:
31/10/2022
U-Office Force Download function has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to download arbitrary system file.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2022

CVE-2022-39023

Publication date:
31/10/2022
U-Office Force Download function has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to download arbitrary system file.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2022

CVE-2022-39024

Publication date:
31/10/2022
U-Office Force Bulletin function has insufficient filtering for special characters. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript and perform XSS (Reflected Cross-Site Scripting) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2022

CVE-2022-39025

Publication date:
31/10/2022
U-Office Force PrintMessage function has insufficient filtering for special characters. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript and perform XSS (Reflected Cross-Site Scripting) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2022