Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-30592

Publication date:
11/05/2022
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-30557

Publication date:
11/05/2022
Foxit PDF Reader and PDF Editor before 11.2.2 have a Type Confusion issue that causes a crash because of Unsigned32 mishandling during JavaScript execution.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-29596

Publication date:
11/05/2022
MicroStrategy Enterprise Manager 2022 allows authentication bypass by triggering a login failure and then entering the Uid=/../../../../../../../../../../../windows/win.ini%00.jpg&Pwd=_any_password_&ConnMode=1&3054=Login substring for directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-29855

Publication date:
11/05/2022
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-30063

Publication date:
11/05/2022
ftcms
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-30448

Publication date:
11/05/2022
Hospital Management System in PHP with Source Code (HMS) 1.0 was discovered to contain a File upload vulnerability in treatmentrecord.php.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-30449

Publication date:
11/05/2022
Hospital Management System in PHP with Source Code (HMS) 1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in room.php.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-30450

Publication date:
11/05/2022
A Remote Code Execution (RCE) vulnerability exists in waimairen 9.1 via wx.php
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-30451

Publication date:
11/05/2022
An authenticated user could execute code via a SQLi vulnerability in waimairenCMS before version 9.1.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022

CVE-2022-29847

Publication date:
11/05/2022
In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2022-29848

Publication date:
11/05/2022
In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2024

CVE-2022-30040

Publication date:
11/05/2022
Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability lies in rootfs_ In / goform / setsystimecfg of / bin / tdhttpd in ubif file system, attackers can access http://ip/goform/SetSysTimeCfg, and by setting the ntpserve parameter, the stack buffer overflow can be caused to achieve the effect of router denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
20/05/2022