Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-25304

Publication date:
23/08/2022
All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2022

CVE-2022-24298

Publication date:
23/08/2022
All versions of package freeopcua/freeopcua are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2026

CVE-2022-2829

Publication date:
23/08/2022
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
Severity CVSS v4.0: Pending analysis
Last modification:
24/08/2022

CVE-2020-35992

Publication date:
23/08/2022
Fiserv Prologue through 2020-12-16 does not properly protect the database password. If an attacker were to gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini), they would be able to decrypt the password stored within the configuration file. This would yield cleartext credentials for the database (to gain access to financial records of customers stored within the database), and in some cases would allow remote login to the database.
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2022-35733

Publication date:
23/08/2022
Missing authentication for critical function vulnerability in UNIMO Technology digital video recorders (UDR-JA1004/JA1008/JA1016 firmware versions v1.0.20.13 and earlier, and UDR-JA1016 firmware versions v2.0.20.13 and earlier) allows a remote unauthenticated attacker to execute an arbitrary OS command by sending a specially crafted request to the affected device web interface.
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2022

CVE-2019-25075

Publication date:
23/08/2022
HTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-42232

Publication date:
23/08/2022
TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-33916

Publication date:
23/08/2022
OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2022-34919

Publication date:
23/08/2022
The file upload wizard in Zengenti Contensis Classic before 15.2.1.79 does not correctly check that a user has authenticated. By uploading a crafted aspx file, it is possible to execute arbitrary commands.
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2021-28861

Publication date:
23/08/2022
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states "Warning: http.server is not recommended for production. It only implements basic security checks."
Severity CVSS v4.0: Pending analysis
Last modification:
17/12/2025

CVE-2022-35191

Publication date:
23/08/2022
D-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via a crafted HTTP connection request.
Severity CVSS v4.0: Pending analysis
Last modification:
26/04/2023

CVE-2022-2923

Publication date:
22/08/2022
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023