Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-3373

Publication date:
01/11/2022
Out of bounds write in V8 in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-2572

Publication date:
01/11/2022
In affected versions of Octopus Server where access is managed by an external authentication provider, it was possible that the API key/keys of a disabled/deleted user were still valid after the access was revoked.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-44542

Publication date:
01/11/2022
lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-43355

Publication date:
01/11/2022
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_service.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-43354

Publication date:
01/11/2022
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/manage_request.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-43353

Publication date:
01/11/2022
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/view_order.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2021-27784

Publication date:
31/10/2022
The provided HCL Launch Container images contain non-unique HTTPS certificates and a database encryption key. The fix provides directions and tools to replace the non-unique keys and certificates. This does not affect the standard installer packages.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2022

CVE-2022-40292

Publication date:
31/10/2022
<br /> The application allowed for Unauthenticated User Enumeration by interacting with an unsecured endpoint to retrieve information on each account within the system.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-40295

Publication date:
31/10/2022
<br /> The application was vulnerable to an authenticated information disclosure, allowing administrators to view unsalted user passwords, which could lead to the compromise of plaintext passwords via offline attacks.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023

CVE-2022-40296

Publication date:
31/10/2022
<br /> The application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-40294

Publication date:
31/10/2022
<br /> The application was identified to have an CSV injection in data export functionality, allowing for malicious code to be embedded within export data and then triggered in exported data viewers.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-40293

Publication date:
31/10/2022
<br /> The application was vulnerable to a session fixation that could be used hijack accounts.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025