Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-34110

Publication date:
12/09/2022
An issue in Micro-Star International MSI Feature Navigator v1.0.1808.0901 allows attackers to download arbitrary files regardless of file type or size.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-36254

Publication date:
12/09/2022
Multiple persistent cross-site scripting (XSS) vulnerabilities in index.php in tramyardg Hotel Management System 1.0 allow remote attackers to inject arbitrary web script or HTML via multiple parameters such as "fullname".
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-36255

Publication date:
12/09/2022
A SQL injection vulnerability in SupplierDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as "searchTxt".
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-38972

Publication date:
12/09/2022
Cross-site scripting vulnerability in Movable Type plugin A-Form versions prior to 4.1.1 (for Movable Type 7 Series) and versions prior to 3.9.1 (for Movable Type 6 Series) allows a remote unauthenticated attacker to inject an arbitrary script.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-37796

Publication date:
12/09/2022
In Simple Online Book Store System 1.0 in /admin_book.php the Title, Author, and Description parameters are vulnerable to Cross Site Scripting(XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
18/10/2023

CVE-2022-37794

Publication date:
12/09/2022
In Library Management System 1.0 the /card/in-card.php file id_no parameters are vulnerable to SQL injection.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-40323

Publication date:
11/09/2022
SysAid Help Desk before 22.1.65 allows XSS in the Password Services module, aka FR# 67241.
Severity CVSS v4.0: Pending analysis
Last modification:
14/09/2022

CVE-2022-40322

Publication date:
11/09/2022
SysAid Help Desk before 22.1.65 allows XSS, aka FR# 66542 and 65579.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-40324

Publication date:
11/09/2022
SysAid Help Desk before 22.1.65 allows XSS via the Linked SRs field, aka FR# 67258.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-40325

Publication date:
11/09/2022
SysAid Help Desk before 22.1.65 allows XSS via the Asset Dashboard, aka FR# 67262.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-26049

Publication date:
11/09/2022
This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution on a target system by exploiting this vulnerability. **Note:** This could have allowed a malicious zip file to extract itself into an arbitrary directory. The only file that Goomph extracts is the p2 bootstrapper and eclipse metadata files hosted at eclipse.org, which are not malicious, so the only way this vulnerability could have affected you is if you had set a custom bootstrap zip, and that zip was malicious.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-25295

Publication date:
11/09/2022
This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\example.com, browser will redirect user to http://example.com.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022