Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22316

Publication date:
23/03/2022
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow an authenticated and authorized user to cause a denial of service due to incorrectly configured authorization checks. IBM X-Force ID: 218276.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2021-43737

Publication date:
23/03/2022
An issus was discovered in xiaohuanxiong CMS 5.0.17. There is a CSRF vulnerability that can modify administrator account's password.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2021-44139

Publication date:
23/03/2022
Sentinel 1.8.2 is vulnerable to Server-side request forgery (SSRF).
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2021-43736

Publication date:
23/03/2022
CmsWing CMS 1.3.7 is affected by a Remote Code Execution (RCE) vulnerability via parameter: log rule
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2021-43735

Publication date:
23/03/2022
CmsWing 1.3.7 is affected by a SQLi vulnerability via parameter: behavior rule.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2021-43738

Publication date:
23/03/2022
An issue was discovered in xiaohuanxiong CMS 5.0.17. There is a CSRF vulnerability that can that can add the administrator account.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2022-23242

Publication date:
23/03/2022
TeamViewer Linux versions before 15.28 do not properly execute a deletion command for the connection password in case of a process crash. Knowledge of the crash event and the TeamViewer ID as well as either possession of the pre-crash connection password or local authenticated access to the machine would have allowed to establish a remote connection by reusing the not properly deleted connection password.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2022-0861

Publication date:
23/03/2022
A XML Extended entity vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote administrator attacker to upload a malicious XML file through the extension import functionality. The impact is limited to some access to confidential information and some ability to alter data.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2022-0857

Publication date:
23/03/2022
A reflected cross-site scripting (XSS) vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to potentially obtain access to an ePO administrator's session by convincing the attacker to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO due to the area of the User Interface the vulnerability is present in.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2022-0858

Publication date:
23/03/2022
A cross-site scripting (XSS) vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to potentially obtain access to an ePO administrator's session by convincing the attacker to click on a carefully crafted link. This would lead to limited ability to alter some information in ePO due to the area of the User Interface the vulnerability is present in.
Severity CVSS v4.0: Pending analysis
Last modification:
16/11/2023

CVE-2022-0859

Publication date:
23/03/2022
McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a local attacker to point an ePO server to an arbitrary SQL server during the restoration of the ePO server. To achieve this the attacker would have to be logged onto the server hosting the ePO server (restricted to administrators) and to know the SQL server password.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023

CVE-2022-0862

Publication date:
23/03/2022
A lack of password change protection vulnerability in a depreciated API of McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to change the password of a compromised session without knowing the existing user's password. This functionality was removed from the User Interface in ePO 10 and the API has now been disabled. Other protection is in place to reduce the likelihood of this being successful through sending a link to a logged in user.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023