Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-26102

Publication date:
10/03/2022
Due to missing authorization check, SAP NetWeaver Application Server for ABAP - versions 700, 701, 702, 731, allows an authenticated attacker, to access content on the start screen of any transaction that is available with in the same SAP system even if he/she isn't authorized for that transaction. A successful exploitation could expose information and in worst case manipulate data before the start screen is executed, resulting in limited impact on confidentiality and integrity of the application.
Severity CVSS v4.0: Pending analysis
Last modification:
06/10/2022

CVE-2022-26100

Publication date:
10/03/2022
SAPCAR - version 7.22, does not contain sufficient input validation on the SAPCAR archive. As a result, the SAPCAR process may crash, and the attacker may obtain privileged access to the system.
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2022

CVE-2022-26101

Publication date:
10/03/2022
Fiori launchpad - versions 754, 755, 756, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
22/12/2022

CVE-2022-25922

Publication date:
10/03/2022
Power Line Communications PLC4TRUCKS J2497 trailer brake controllers implement diagnostic functions which can be invoked by replaying J2497 messages. There is no authentication or authorization for these functions.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2022

CVE-2022-25830

Publication date:
10/03/2022
Information Exposure vulnerability in Galaxy Watch3 Plugin prior to version 2.2.09.22012751 allows attacker to access password information of connected WiFiAp in the log
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023

CVE-2022-25829

Publication date:
10/03/2022
Information Exposure vulnerability in Watch Active2 Plugin prior to version 2.2.08.22012751 allows attacker to access password information of connected WiFiAp in the log
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023

CVE-2022-25828

Publication date:
10/03/2022
Information Exposure vulnerability in Watch Active Plugin prior to version 2.2.07.22012751 allows attacker to access password information of connected WiFiAp in the log
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023

CVE-2022-25826

Publication date:
10/03/2022
Information Exposure vulnerability in Galaxy S3 Plugin prior to version 2.2.03.22012751 allows attacker to access password information of connected WiFiAp in the log
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023

CVE-2022-25827

Publication date:
10/03/2022
Information Exposure vulnerability in Galaxy Watch Plugin prior to version 2.2.05.22012751 allows attacker to access password information of connected WiFiAp in the log
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023

CVE-2022-25825

Publication date:
10/03/2022
Improper access control vulnerability in Samsung Account prior to version 13.1.0.1 allows attackers to access to the authcode for sign-in.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2022

CVE-2022-25824

Publication date:
10/03/2022
Improper access control vulnerability in BixbyTouch prior to version 2.2.00.6 in China models allows untrusted applications to load arbitrary URL and local files in webview.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2023

CVE-2022-25823

Publication date:
10/03/2022
Information Exposure vulnerability in Galaxy Watch Plugin prior to version 2.2.05.220126741 allows attackers to access user information in log.
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023