Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-35259

Publication date:
13/07/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2020-35257

Publication date:
13/07/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-27294

Publication date:
13/07/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2019-10800

Publication date:
13/07/2022
This affects the package codecov before 2.0.16. The vulnerability occurs due to not sanitizing gcov arguments before being being provided to the popen method.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2022

CVE-2019-10761

Publication date:
13/07/2022
This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2022

CVE-2022-31781

Publication date:
13/07/2022
Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular expression used on the parameter of the org.apache.tapestry5.http.ContentType class. Apache Tapestry 5.8.2 has a fix for this vulnerability. Notice the vulnerability cannot be triggered by web requests in Tapestry code alone. It would only happen if there's some non-Tapestry codepath passing some outside input to the ContentType class constructor.
Severity CVSS v4.0: Pending analysis
Last modification:
02/08/2023

CVE-2021-46827

Publication date:
13/07/2022
An issue was discovered in Oxygen XML WebHelp before 22.1 build 2021082006 and 23.x before 23.1 build 2021090310. An XSS vulnerability in search terms proposals (in online documentation generated using Oxygen XML WebHelp) allows attackers to execute JavaScript by convincing a user to type specific text in the WebHelp output search field.
Severity CVSS v4.0: Pending analysis
Last modification:
20/07/2022

CVE-2022-35628

Publication date:
12/07/2022
A SQL injection issue was discovered in the lux extension before 17.6.1, and 18.x through 24.x before 24.0.2, for TYPO3.
Severity CVSS v4.0: Pending analysis
Last modification:
27/07/2022

CVE-2022-33678

Publication date:
12/07/2022
Azure Site Recovery Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2023

CVE-2022-33659

Publication date:
12/07/2022
Azure Site Recovery Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2023

CVE-2022-33660

Publication date:
12/07/2022
Azure Site Recovery Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2023

CVE-2022-33661

Publication date:
12/07/2022
Azure Site Recovery Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
17/05/2023