Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-2965

Publication date:
23/08/2022
Improper Restriction of Rendered UI Layers or Frames in GitHub repository notrinos/notrinoserp prior to 0.7.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2022

CVE-2021-3905

Publication date:
23/08/2022
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
Severity CVSS v4.0: Pending analysis
Last modification:
26/11/2023

CVE-2021-3827

Publication date:
23/08/2022
A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
30/11/2022

CVE-2022-35235

Publication date:
23/08/2022
Authenticated (admin+) Arbitrary File Read vulnerability in XplodedThemes WPide plugin
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2022-35242

Publication date:
23/08/2022
Unauthenticated plugin settings change vulnerability in 59sec THE Leads Management System: 59sec LITE plugin
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2022-34868

Publication date:
23/08/2022
Authenticated Arbitrary Settings Update vulnerability in YooMoney ЮKassa для WooCommerce plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-33142

Publication date:
23/08/2022
Authenticated (subscriber+) Denial Of Service (DoS) vulnerability in WordPlus WordPress Better Messages plugin
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2021-3894

Publication date:
23/08/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-3736

Publication date:
23/08/2022
A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information.
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2021-3764

Publication date:
23/08/2022
A memory leak flaw was found in the Linux kernel's ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2021-3763

Publication date:
23/08/2022
A flaw was found in the Red Hat AMQ Broker management console in version 7.8 where an existing user is able to access some limited information even when the role the user is assigned to should not be allow access to the management console. The main impact is to confidentiality as this flaw means some role bindings are incorrectly checked, some privileged meta information such as queue names and configuration details are disclosed but the impact is limited as not all information is accessible and there is no affect to integrity.
Severity CVSS v4.0: Pending analysis
Last modification:
27/08/2022

CVE-2021-3714

Publication date:
23/08/2022
A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged.
Severity CVSS v4.0: Pending analysis
Last modification:
01/02/2024