Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-38768

Publication date:
13/09/2022
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to bypass authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-38769

Publication date:
13/09/2022
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to fetch cleartext passwords upon a successful login request.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-38770

Publication date:
13/09/2022
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to fetch other users' data upon a successful login request.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-34102

Publication date:
13/09/2022
Insufficient access control vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can pause the uninstallation of an executable to gain a SYSTEM level command prompt.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2022

CVE-2022-38633

Publication date:
13/09/2022
Genymotion Desktop v3.2.1 was discovered to contain a DLL hijacking vulnerability which allows attackers to escalate privileges and execute arbitrary code via a crafted binary.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2022

CVE-2022-35413

Publication date:
13/09/2022
WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-35582

Publication date:
13/09/2022
Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-31324

Publication date:
13/09/2022
An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-34101

Publication date:
13/09/2022
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can place a malicious DLL in a certain path to execute code and preform a privilege escalation attack.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2022

CVE-2022-31322

Publication date:
13/09/2022
Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-31861

Publication date:
13/09/2022
Cross site Scripting (XSS) in ThingsBoard IoT Platform through 3.3.4.1 via a crafted value being sent to the audit logs.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2022

CVE-2021-36568

Publication date:
13/09/2022
In certain Moodle products after creating a course, it is possible to add in a arbitrary "Topic" a resource, in this case a "Database" with the type "Text" where its values "Field name" and "Field description" are vulnerable to Cross Site Scripting Stored(XSS). This affects Moodle 3.11 and Moodle 3.10.4 and Moodle 3.9.7.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023