Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-42296

Publication date:
01/03/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-42297

Publication date:
01/03/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-42298

Publication date:
01/03/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2023-20032

Publication date:
01/03/2023
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:<br /> <br /> <br /> A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.<br /> <br /> <br /> This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.<br /> <br /> For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"].
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2024

CVE-2023-20052

Publication date:
01/03/2023
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:<br /> <br /> <br /> A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.<br /> <br /> <br /> This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2024

CVE-2023-0567

Publication date:
01/03/2023
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2026

CVE-2022-20952

Publication date:
01/03/2023
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an unauthenticated, remote attacker to bypass a configured rule, thereby allowing traffic onto a network that should have been blocked.<br /> <br /> This vulnerability exists because malformed, encoded traffic is not properly detected. An attacker could exploit this vulnerability by connecting through an affected device to a malicious server and receiving malformed HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
Severity CVSS v4.0: Pending analysis
Last modification:
25/01/2024

CVE-2022-37938

Publication date:
01/03/2023
Unauthenticated server side request forgery in HPE Serviceguard Manager
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2022-37936

Publication date:
01/03/2023
Unauthenticated Java deserialization vulnerability in Serviceguard Manager<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2025

CVE-2022-27672

Publication date:
01/03/2023
<br /> When SMT is enabled, certain AMD processors may speculatively execute instructions using a target<br /> from the sibling thread after an SMT mode switch potentially resulting in information disclosure.<br /> <br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2024

CVE-2022-38735

Publication date:
01/03/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-38736

Publication date:
01/03/2023
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023