Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-27873

Publication date:
29/07/2022
An attacker can force the victim’s device to perform arbitrary HTTP requests in WAN through a malicious SVG file being parsed by Autodesk Fusion 360’s document parser. The vulnerability exists in the application’s ‘Insert SVG’ procedure. An attacker can also leverage this vulnerability to obtain victim’s public IP and possibly other sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2022

CVE-2022-35643

Publication date:
29/07/2022
IBM PowerVM VIOS 3.1 could allow a remote attacker to tamper with system configuration or cause a denial of service. IBM X-Force ID: 230956.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2022

CVE-2022-2576

Publication date:
29/07/2022
In Eclipse Californium version 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load (DoS own peer). The misbehavior occurs only with DTLS_VERIFY_PEERS_ON_RESUMPTION_THRESHOLD values larger than 0.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2022

CVE-2022-36123

Publication date:
29/07/2022
The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
04/09/2022

CVE-2022-1277

Publication date:
29/07/2022
Inavitas Solar Log product has an unauthenticated SQL Injection vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2024

CVE-2022-24912

Publication date:
29/07/2022
The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2022

CVE-2022-1799

Publication date:
29/07/2022
Incorrect signature trust exists within Google Play services SDK play-services-basement. A debug version of Google Play services is trusted by the SDK for devices that are non-GMS. We recommend upgrading the SDK past the 2022-05-03 release.
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2022

CVE-2021-3601

Publication date:
29/07/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. OpenSSL does not class this issue as a security vulnerability. The trusted CA store should not contain anything that the user does not trust to issue other certificates. Notes: https://github.com/openssl/openssl/issues/5236#issuecomment-119646061
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-36234

Publication date:
28/07/2022
SimpleNetwork TCP Server commit 29bc615f0d9910eb2f59aa8dff1f54f0e3af4496 was discovered to contain a double free vulnerability which is exploited via crafted TCP packets.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2022

CVE-2022-34556

Publication date:
28/07/2022
PicoC v3.2.2 was discovered to contain a NULL pointer dereference at variable.c.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2022

CVE-2022-34558

Publication date:
28/07/2022
WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr 2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2022

CVE-2022-36752

Publication date:
28/07/2022
png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file.
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2022