Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-33198

Publication date:
21/07/2022
Unauthenticated WordPress Options Change vulnerability in Biplob Adhikari's Accordions plugin
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2023

CVE-2022-30337

Publication date:
21/07/2022
Cross-Site Request Forgery (CSRF) vulnerability in JoomUnited WP Meta SEO plugin
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2022-35899

Publication date:
21/07/2022
There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSDK.exe) 1.0.0.4. This might allow a local user to escalate privileges by creating a %PROGRAMFILES(X86)%\ASUS\GameSDK.exe file.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2022

CVE-2022-28666

Publication date:
21/07/2022
Broken Access Control vulnerability in YIKES Inc. Custom Product Tabs for WooCommerce plugin
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2022-32289

Publication date:
21/07/2022
Cross-Site Request Forgery (CSRF) vulnerability in Sygnoos Popup Builder plugin
Severity CVSS v4.0: Pending analysis
Last modification:
25/07/2022

CVE-2022-30628

Publication date:
21/07/2022
It was possible to download all receipts without authentication. Must first access the API https://XXXX.supersmart.me/services/v4/customer/signin to get a TOKEN. Then you can then access the API that provides invoice images based on the URL https://XXXX.supersmart.me/services/v4/invoiceImg?orderId=XXXXX
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2022

CVE-2022-28877

Publication date:
21/07/2022
This vulnerability allows local user to delete arbitrary file in the system and bypassing security protection which can be abused for local privilege escalation on affected F-Secure & WithSecure windows endpoint products. An attacker must have code execution rights on the victim machine prior to successful exploitation.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2022

CVE-2022-36313

Publication date:
21/07/2022
An issue was discovered in the file-type package before 16.5.4 and 17.x before 17.1.3 for Node.js. A malformed MKV file could cause the file type detector to get caught in an infinite loop. This would make the application become unresponsive and could be used to cause a DoS attack.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2022-32430

Publication date:
21/07/2022
An access control issue in Lin CMS Spring Boot v0.2.1 allows attackers to access the backend information and functions within the application.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-34767

Publication date:
21/07/2022
Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-0902

Publication date:
21/07/2022
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2022-28860

Publication date:
21/07/2022
An authentication downgrade in the server in Citilog 8.0 allows an attacker (in a man in the middle position between the server and its smart camera Axis M1125) to achieve HTTP access to the camera.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023