Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-20651

Publication date:
22/06/2022
A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23079

Publication date:
22/06/2022
In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to host header injection in the password reset functionality where malicious actor can send fake password reset email to arbitrary victim.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2174

Publication date:
22/06/2022
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2022-23078

Publication date:
22/06/2022
In habitica versions v4.119.0 through v4.232.2 are vulnerable to open redirect via the login page.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23077

Publication date:
22/06/2022
In habitica versions v4.119.0 through v4.232.2 are vulnerable to DOM XSS via the login page.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-31248

Publication date:
22/06/2022
A Observable Response Discrepancy vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to discover valid usernames. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46-1. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37-1.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2022

CVE-2022-21952

Publication date:
22/06/2022
A Missing Authentication for Critical Function vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2022-23055

Publication date:
22/06/2022
In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23056

Publication date:
22/06/2022
In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23057

Publication date:
22/06/2022
In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-23058

Publication date:
22/06/2022
ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2017-20082

Publication date:
22/06/2022
A vulnerability, which was classified as problematic, has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. This issue affects some unknown processing. The manipulation leads to backdoor. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022