Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-29408

Publication date:
25/05/2022
Persistent Cross-Site Scripting (XSS) vulnerability in Vsourz Digital's Advanced Contact form 7 DB plugin
Severity CVSS v4.0: Pending analysis
Last modification:
01/06/2022

CVE-2022-28875

Publication date:
25/05/2022
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-30427

Publication date:
25/05/2022
In ginadmin through 05-10-2022 the incoming path value is not filtered, resulting in directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-30428

Publication date:
25/05/2022
In ginadmin through 05-10-2022, the incoming path value is not filtered, resulting in arbitrary file reading.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-27305

Publication date:
25/05/2022
Gibbon v23 does not generate a new session ID cookie after a user authenticates, making the application vulnerable to session fixation.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1348

Publication date:
25/05/2022
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
Severity CVSS v4.0: Pending analysis
Last modification:
09/06/2025

CVE-2021-44719

Publication date:
25/05/2022
Docker Desktop 4.3.0 has Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-23775

Publication date:
25/05/2022
TrueStack Direct Connect 1.4.7 has Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-1678

Publication date:
25/05/2022
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-29380

Publication date:
25/05/2022
Academy-LMS v4.3 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the SEO panel.
Severity CVSS v4.0: Pending analysis
Last modification:
02/06/2022

CVE-2021-35487

Publication date:
25/05/2022
Nokia Broadcast Message Center through 11.1.0 allows an authenticated user to perform a Boolean Blind SQL Injection attack on the endpoint /owui/block/send-receive-updates (for the Manage Alerts page) via the extIdentifier HTTP POST parameter. This allows an attacker to obtain the database user, database name, and database version information, and potentially database data.
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2022

CVE-2021-32989

Publication date:
25/05/2022
When a non-existent resource is requested, the LCDS LAquis SCADA application (version 4.3.1.1011 and prior) returns error messages which may allow reflected cross-site scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2022