Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-23646

Publication date:
17/02/2022
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2022-22914

Publication date:
17/02/2022
An incorrect access control issue in the component FileManager of Ovidentia CMS 6.0 allows authenticated attackers to to view and download content in the upload directory via path traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2021-46314

Publication date:
17/02/2022
A Remote Command Execution (RCE) vulnerability exists in HNAP1/control/SetNetworkTomographySettings.php of D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin because backticks can be used for command injection when judging whether it is a reasonable domain name.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-45382

Publication date:
17/02/2022
A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2014-8597

Publication date:
17/02/2022
A reflected cross-site scripting (XSS) vulnerability in PHP-Fusion 7.02.07 allows remote attackers to inject arbitrary web script or HTML via the status parameter in the CMS admin panel.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2022

CVE-2022-0633

Publication date:
17/02/2022
The UpdraftPlus WordPress plugin Free before 1.22.3 and Premium before 2.22.3 do not properly validate a user has the required privileges to access a backup's nonce identifier, which may allow any users with an account on the site (such as subscriber) to download the most recent site & database backup.
Severity CVSS v4.0: Pending analysis
Last modification:
18/02/2022

CVE-2022-22912

Publication date:
17/02/2022
Prototype pollution vulnerability via .parse() in Plist before v3.0.4 allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
14/07/2022

CVE-2021-46247

Publication date:
17/02/2022
The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from ASUS CMAX6000 v1.02.00.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2022-0639

Publication date:
17/02/2022
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.
Severity CVSS v4.0: Pending analysis
Last modification:
16/12/2025

CVE-2022-0638

Publication date:
17/02/2022
Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2021-39034

Publication date:
17/02/2022
IBM MQ 9.1 LTS is vulnerable to a denial of service attack caused by an issue within the channel process. IBM X-Force ID: 213964.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2022

CVE-2022-24683

Publication date:
17/02/2022
HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022