Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-40626

Publication date:
14/09/2022
An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-40673

Publication date:
14/09/2022
KDiskMark before 3.1.0 lacks authorization checking for D-Bus methods such as Helper::flushPageCache.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-37140

Publication date:
14/09/2022
PayMoney 3.3 is vulnerable to Client Side Remote Code Execution (RCE). The vulnerability exists on the reply ticket function and upload the malicious file. A calculator will open when the victim who download the file open the RTF file.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-37137

Publication date:
14/09/2022
PayMoney 3.3 is vulnerable to Stored Cross-Site Scripting (XSS) during replying the ticket. The XSS can be obtain from injecting under "Message" field with "description" parameter with the specially crafted payload to gain Stored XSS. The XSS then will prompt after that or can be access from the view ticket function.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025

CVE-2022-37138

Publication date:
14/09/2022
Loan Management System 1.0 is vulnerable to SQL Injection at the login page, which allows unauthorized users to login as Administrator after injecting username form.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2024

CVE-2022-37139

Publication date:
14/09/2022
Loan Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2024

CVE-2022-36669

Publication date:
14/09/2022
Hospital Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-36667

Publication date:
14/09/2022
Garage Management System 1.0 is vulnerable to the Remote Code Execution (RCE) due to the lack of filtering from the file upload function. The vulnerability exist during adding parts and from the upload function, the attacker can upload PHP Reverse Shell straight away to gain RCE.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-36668

Publication date:
14/09/2022
Garage Management System 1.0 is vulnerable to Stored Cross Site Scripting (XSS) on several parameters. The vulnerabilities exist during creating or editing the parts under parameters. Using the XSS payload, the Stored XSS triggered and can be used for further attack vector.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-36436

Publication date:
14/09/2022
OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthenticator authentication-bypass vulnerability that could allow a malicious actor to gain unauthorized access to a VNC session or to disconnect a legitimate user from a VNC session. A remote attacker with network access to the proxy server could leverage this vulnerability to connect to VNC servers protected by the proxy server without providing any authentication credentials. Exploitation of this issue requires that the proxy server is currently accepting connections for the target VNC server.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2022-2900

Publication date:
14/09/2022
Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 8.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-34831

Publication date:
14/09/2022
An issue was discovered in Keyfactor PrimeKey EJBCA before 7.9.0, related to possible inconsistencies in DNS identifiers submitted in an ACME order and the corresponding CSR submitted during finalization. During the ACME enrollment process, an order is submitted containing an identifier for one or multiple dnsNames. These are validated properly in the ACME challenge. However, if the validation passes, a non-compliant client can include additional dnsNames the CSR sent to the finalize endpoint, resulting in EJBCA issuing a certificate including the identifiers that were not validated. This occurs even if the certificate profile is configured to not allow a DN override by the CSR.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022