Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-27759

Publication date:
06/05/2022
This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2022

CVE-2021-27761

Publication date:
06/05/2022
Weak web transport security (Weak TLS): An attacker may be able to decrypt the data using attacks
Severity CVSS v4.0: Pending analysis
Last modification:
18/05/2022

CVE-2021-27762

Publication date:
06/05/2022
Misconfigured security-related HTTP headers: Several security-related headers were missing or mis-configured on the web responses
Severity CVSS v4.0: Pending analysis
Last modification:
18/05/2022

CVE-2021-27764

Publication date:
06/05/2022
Cookie without HTTPONLY flag set. NUMBER cookie(s) was set without Secure or HTTPOnly flags. The images show the cookie with the missing flag. (WebUI)
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2021-27760

Publication date:
06/05/2022
An issue was discovered in the Sametime chat feature in the Notes 11.0 - 11.0.1 FP4 clients. An authenticated Sametime chat user could cause Remote Code Execution on another chat client by sending a specially formatted message through chat containing Javascript code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/07/2022

CVE-2022-28507

Publication date:
06/05/2022
Dragon Path Technologies Bharti Airtel Routers Hardware BDT-121 version 1.0 is vulnerable to Cross Site Scripting (XSS) via Dragon path router admin page.
Severity CVSS v4.0: Pending analysis
Last modification:
14/05/2022

CVE-2022-28545

Publication date:
06/05/2022
FUDforum 3.1.1 is vulnerable to Stored XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2022

CVE-2022-29421

Publication date:
06/05/2022
Reflected Cross-Site Scripting (XSS) vulnerability in Adam Skaat's Countdown & Clock plugin on WordPress via &ycd_type vulnerable parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2022

CVE-2022-29420

Publication date:
06/05/2022
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Adam Skaat Countdown & Clock (WordPress plugin) countdown-builder allows Stored XSS.This issue affects Countdown & Clock (WordPress plugin): from n/a through 2.3.2.
Severity CVSS v4.0: Pending analysis
Last modification:
26/06/2024

CVE-2022-28165

Publication date:
06/05/2022
A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav before 2.2.0 could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because restrictions are not performed on Server side to ensure the user has required permission before processing requests.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-1053

Publication date:
06/05/2022
Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1,
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-33845

Publication date:
06/05/2022
The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2022