Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-2756

Publication date:
10/08/2022
Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2022

CVE-2022-38133

Publication date:
10/08/2022
In JetBrains TeamCity before 2022.04.3 the private SSH key could be written to the server log in some cases
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2022-0028

Publication date:
10/08/2022
A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2022-36324

Publication date:
10/08/2022
Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2023

CVE-2022-36323

Publication date:
10/08/2022
Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2022-36325

Publication date:
10/08/2022
Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2022-34659

Publication date:
10/08/2022
A vulnerability has been identified in Simcenter STAR-CCM+ (All versions only if the Power-on-Demand public license server is used). Affected applications expose user, host and display name of users, when the public license server is used. This could allow an attacker to retrieve this information.
Severity CVSS v4.0: Pending analysis
Last modification:
16/08/2022

CVE-2022-34661

Publication date:
10/08/2022
A vulnerability has been identified in Teamcenter V12.4 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2025

CVE-2022-34660

Publication date:
10/08/2022
A vulnerability has been identified in Teamcenter V12.4 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
08/09/2025

CVE-2021-46304

Publication date:
10/08/2022
A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions), CP-8021 MASTER MODULE (All versions), CP-8022 MASTER MODULE WITH GPRS (All versions). The component allows to activate a web server module which provides unauthenticated access to its web pages. This could allow an attacker to retrieve debug-level information from the component such as internal network topology or connected systems.
Severity CVSS v4.0: Pending analysis
Last modification:
20/10/2025

CVE-2022-2242

Publication date:
10/08/2022
The KUKA SystemSoftware V/KSS in versions prior to 8.6.5 is prone to improper access control as an unauthorized attacker can directly read and write robot configurations when access control is not available or not enabled (default).
Severity CVSS v4.0: Pending analysis
Last modification:
12/08/2022

CVE-2022-20852

Publication date:
10/08/2022
Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow a remote attacker to conduct a cross-site scripting (XSS) attack or a frame hijacking attack against a user of the web interface. For more information about these vulnerabilities, see the Details section of this advisory.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023