Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-34775

Publication date:
22/08/2022
Tabit - Excessive data exposure. Another endpoint mapped by the tiny url, was one for reservation cancellation, containing the MongoDB ID of the reservation, and organization. This can be used to query the http://tgm-api.tabit.cloud/rsv/management/{reservationId}?organization={orgId} API which returns a lot of data regarding the reservation (OWASP: API3): Name, mail, phone number, the number of visits of the user to this specific restaurant, the money he spent there, the money he spent on alcohol, whether he left a deposit etc. This information can easily be used for a phishing attack.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-34858

Publication date:
22/08/2022
Authentication Bypass vulnerability in miniOrange OAuth 2.0 client for SSO plugin
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2022-35655

Publication date:
22/08/2022
Pega Platform from 7.3 to 8.7.3 is affected by an XSS issue due to a misconfiguration of a datapage setting.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-35654

Publication date:
22/08/2022
Pega Platform from 8.5.4 to 8.7.3 is affected by an XSS issue with an unauthenticated user and the redirect parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-35656

Publication date:
22/08/2022
Pega Platform from 8.3 to 8.7.3 vulnerability may allow authenticated security administrators to alter CSRF settings directly.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-34857

Publication date:
22/08/2022
Reflected Cross-Site Scripting (XSS) vulnerability in smartypants SP Project & Document Manager plugin
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-36346

Publication date:
22/08/2022
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Max Foundry MaxButtons plugin
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-34347

Publication date:
22/08/2022
Cross-Site Request Forgery (CSRF) vulnerability in W3 Eden Download Manager plugin
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2025

CVE-2022-37133

Publication date:
22/08/2022
D-link DIR-816 A2_v1.10CNB04.img reboots the router without authentication via /goform/doReboot. No authentication is required, and reboot is executed when the function returns at the end.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2022

CVE-2022-34776

Publication date:
22/08/2022
Tabit - giftcard stealth. Several APIs on the web system display, without authorization, sensitive information such as health statements, previous bills in a specific restaurant, alcohol consumption and smoking habits. Each of the described APIs, has in its URL one or more MongoDB ID which is not so simple to enumerate. However, they each receive a 'tiny URL' in tabits domain, in the form of https://tbit.be/{suffix} with suffix being a 5 character long string containing numbers, lower and upper case letters. It is not so simple to enumerate them all, but really easy to find some that work and lead to a personal endpoint. Furthermore, the redirect URL disclosed the MongoDB IDs discussed above, and we could use them to query other endpoints disclosing more personal information.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2023

CVE-2022-34774

Publication date:
22/08/2022
Tabit - Arbitrary account modification. One of the endpoints mapped by the tiny URL, was a page where an adversary can modify personal details, such as email addresses and phone numbers of a specific user in a restaurant's loyalty program. Possibly allowing account takeover (the mail can be used to reset password).
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2023

CVE-2022-34773

Publication date:
22/08/2022
Tabit - HTTP Method manipulation. https://bridge.tabit.cloud/configuration/addresses-query - can be POST-ed to add addresses to the DB. This is an example of OWASP:API8 – Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2023