Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-36008

Publication date:
19/08/2022
Frontier is Substrate's Ethereum compatibility layer. A security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic. No action is needed unless you have a bridge node that needs to distinguish different reversion exit reasons and you used RPC for this. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2022-2788

Publication date:
19/08/2022
Emerson Electric's Proficy Machine Edition Version 9.80 and prior is vulnerable to CWE-29 Path Traversal: '\..\Filename', also known as a ZipSlip attack, through an upload procedure which enables attackers to implant a malicious .BLZ file on the PLC. The file can transfer through the engineering station onto Windows in a way that executes the malicious code.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2023

CVE-2022-36170

Publication date:
19/08/2022
MapGIS 10.5 Pro IGServer has hardcoded credentials in the front-end and can lead to escalation of privileges and arbitrary file deletion.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-36031

Publication date:
19/08/2022
Directus is a free and open-source data platform for headless content management. The Directus process can be aborted by having an authorized user update the `filename_disk` value to a folder and accessing that file through the `/assets` endpoint. This vulnerability has been patched and release v9.15.0 contains the fix. Users are advised to upgrade. Users unable to upgrade may prevent this problem by making sure no (untrusted) non-admin users have permissions to update the `filename_disk` field on `directus_files`.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2022

CVE-2022-23460

Publication date:
19/08/2022
Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx json parsing may lead to stack exhaustion in an address sanitized (ASAN) build. This issue may lead to Denial of Service if the program using the jsonxx library crashes. This issue exists on the current commit of the jsonxx project and the project itself has been archived. Updates are not expected. Users are advised to find a replacement.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2022-23459

Publication date:
19/08/2022
Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. This issue exists on the current commit of the jsonxx project. The project itself has been archived and updates are not expected. Users are advised to find a replacement.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2025

CVE-2022-22489

Publication date:
19/08/2022
IBM MQ 8.0, (9.0, 9.1, 9.2 LTS), and (9.1 and 9.2 CD) are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226339.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2022

CVE-2022-0542

Publication date:
19/08/2022
Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.7.0.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-36578

Publication date:
19/08/2022
jizhicms v2.3.1 has SQL injection in the background.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2022

CVE-2022-37254

Publication date:
19/08/2022
DolphinPHP 1.5.1 is vulnerable to Cross Site Scripting (XSS) via Background - > System - > system function - > configuration management.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2022

CVE-2022-36579

Publication date:
19/08/2022
Wellcms 2.2.0 is vulnerable to Cross Site Request Forgery (CSRF).
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2022

CVE-2022-36577

Publication date:
19/08/2022
An issue was discovered in jizhicms v2.3.1. There is a CSRF vulnerability that can add a admin.
Severity CVSS v4.0: Pending analysis
Last modification:
22/08/2022