Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-34306

Publication date:
08/07/2022
IBM CICS TX Standard and Advanced 11.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 229435.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-34160

Publication date:
08/07/2022
IBM CICS TX Standard and Advanced 11.1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 229330.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-35406

Publication date:
08/07/2022
A URL disclosure issue was discovered in Burp Suite before 2022.6. If a user views a crafted response in the Repeater or Intruder, it may be incorrectly interpreted as a redirect.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-28624

Publication date:
08/07/2022
A potential security vulnerability has been identified in certain HPE FlexNetwork and FlexFabric switch products. The vulnerability could be remotely exploited to allow cross site scripting (XSS). HPE has made the following software updates to resolve the vulnerability. HPE FlexNetwork 5130EL_7.10.R3507P02 and HPE FlexFabric 5945_7.10.R6635.
Severity CVSS v4.0: Pending analysis
Last modification:
16/07/2022

CVE-2022-28623

Publication date:
08/07/2022
Security vulnerabilities in HPE IceWall SSO 10.0 certd could be exploited remotely to allow SQL injection or unauthorized data injection. HPE has provided the following updated modules to resolve these vulnerabilities. HPE IceWall SSO version 10.0 certd library Patch 9 for RHEL and HPE IceWall SSO version 10.0 certd library Patch 9 for HP-UX.
Severity CVSS v4.0: Pending analysis
Last modification:
18/07/2022

CVE-2022-30852

Publication date:
08/07/2022
Known v1.3.1 was discovered to contain an Insecure Direct Object Reference (IDOR).
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-31290

Publication date:
08/07/2022
A cross-site scripting (XSS) vulnerability in Known v1.2.2+2020061101 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Your Name text field.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-32115

Publication date:
08/07/2022
An issue in the isSVG() function of Known v1.2.2+2020061101 allows attackers to execute arbitrary code via a crafted SVG file.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-33011

Publication date:
08/07/2022
Known v1.3.1+2020120201 was discovered to allow attackers to perform an account takeover via a host header injection attack.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2022

CVE-2021-41037

Publication date:
08/07/2022
In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2024

CVE-2022-1245

Publication date:
08/07/2022
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-32061

Publication date:
07/07/2022
An arbitrary file upload vulnerability in the Select User function under the People Menu component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022