Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-23099

Publication date:
27/07/2022
OX App Suite through 7.10.6 allows XSS by forcing block-wise read.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-23100

Publication date:
27/07/2022
OX App Suite through 7.10.6 allows OS Command Injection via Documentconverter (e.g., through an email attachment).
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-23101

Publication date:
27/07/2022
OX App Suite through 7.10.6 allows XSS via appHandler in a deep link in an e-mail message.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-24405

Publication date:
27/07/2022
OX App Suite through 7.10.6 allows OS Command Injection via a serialized Java class to the Documentconverter API.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-34549

Publication date:
27/07/2022
Sims v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /uploadServlet. This vulnerability allows attackers to escalate privileges and execute arbitrary commands via a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-34551

Publication date:
27/07/2022
Sims v1.0 was discovered to allow path traversal when downloading attachments.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-34550

Publication date:
27/07/2022
Sims v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /addNotifyServlet. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the notifyInfo parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2022

CVE-2022-33970

Publication date:
27/07/2022
Authenticated WordPress Options Change vulnerability in Biplob018 Shortcode Addons plugin
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2022-24406

Publication date:
27/07/2022
OX App Suite through 7.10.6 allows SSRF because multipart/form-data boundaries are predictable, and this can lead to injection into internal Documentconverter API calls.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-34529

Publication date:
27/07/2022
WASM3 v0.5.0 was discovered to contain a segmentation fault via the component Compile_Memory_CopyFill.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-2313

Publication date:
27/07/2022
A DLL hijacking vulnerability in the MA Smart Installer for Windows prior to 5.7.7, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL into the folder from where the Smart installer is being executed.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2310

Publication date:
27/07/2022
An authentication bypass vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.12, 9.x prior to 9.2.23, 8.x prior to 8.2.28, and controlled release 11.x prior to 11.2.1 allows a remote attacker to bypass authentication into the administration User Interface. This is possible because of SWG incorrectly whitelisting authentication bypass methods and using a weak crypto password. This can lead to the attacker logging into the SWG admin interface, without valid credentials, as the super user with complete control over the SWG.
Severity CVSS v4.0: Pending analysis
Last modification:
15/11/2023