Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-37139

Publication date:
14/09/2022
Loan Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2024

CVE-2022-36669

Publication date:
14/09/2022
Hospital Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-36667

Publication date:
14/09/2022
Garage Management System 1.0 is vulnerable to the Remote Code Execution (RCE) due to the lack of filtering from the file upload function. The vulnerability exist during adding parts and from the upload function, the attacker can upload PHP Reverse Shell straight away to gain RCE.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-36668

Publication date:
14/09/2022
Garage Management System 1.0 is vulnerable to Stored Cross Site Scripting (XSS) on several parameters. The vulnerabilities exist during creating or editing the parts under parameters. Using the XSS payload, the Stored XSS triggered and can be used for further attack vector.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-36436

Publication date:
14/09/2022
OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthenticator authentication-bypass vulnerability that could allow a malicious actor to gain unauthorized access to a VNC session or to disconnect a legitimate user from a VNC session. A remote attacker with network access to the proxy server could leverage this vulnerability to connect to VNC servers protected by the proxy server without providing any authentication credentials. Exploitation of this issue requires that the proxy server is currently accepting connections for the target VNC server.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2022-2900

Publication date:
14/09/2022
Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 8.1.0.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-34831

Publication date:
14/09/2022
An issue was discovered in Keyfactor PrimeKey EJBCA before 7.9.0, related to possible inconsistencies in DNS identifiers submitted in an ACME order and the corresponding CSR submitted during finalization. During the ACME enrollment process, an order is submitted containing an identifier for one or multiple dnsNames. These are validated properly in the ACME challenge. However, if the validation passes, a non-compliant client can include additional dnsNames the CSR sent to the finalize endpoint, resulting in EJBCA issuing a certificate including the identifiers that were not validated. This occurs even if the certificate profile is configured to not allow a DN override by the CSR.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2020-19586

Publication date:
14/09/2022
Incorrect Access Control issue in Yellowfin Business Intelligence 7.3 allows remote attackers to escalate privilege via MIAdminStyles.i4 Admin UI.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2022

CVE-2020-19587

Publication date:
14/09/2022
Cross Site Scripting (XSS) vulnerability in configMap parameters in Yellowfin Business Intelligence 7.3 allows remote attackers to run arbitrary code via MIAdminStyles.i4 Admin UI.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2022

CVE-2022-37191

Publication date:
13/09/2022
The component "cuppa/api/index.php" of CuppaCMS v1.0 is Vulnerable to LFI. An authenticated user can read system files via crafted POST request using [function] parameter value as LFI payload.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2022

CVE-2022-38305

Publication date:
13/09/2022
AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vulnerability via the component /admin/profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2022

CVE-2022-38771

Publication date:
13/09/2022
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to send SCRIPT tags as injected input to the API request.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2022