Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-41924

Publication date:
21/06/2022
Webkul krayin crm before 1.2.2 is vulnerable to Cross Site Scripting (XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2022-22979

Publication date:
21/06/2022
In Spring Cloud Function versions prior to 3.2.6, it is possible for a user who directly interacts with framework provided lookup functionality to cause a denial-of-service condition due to the caching issue in the Function Catalog component of the framework.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2022-1833

Publication date:
21/06/2022
A flaw was found in AMQ Broker Operator 7.9.4 installed via UI using OperatorHub where a low-privilege user that has access to the namespace where the AMQ Operator is deployed has access to clusterwide edit rights by checking the secrets. The service account used for building the Operator gives more permission than expected and an attacker could benefit from it. This requires at least an already compromised low-privilege account or insider attack.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-26147

Publication date:
21/06/2022
The Quectel RG502Q-EA modem before 2022-02-23 allow OS Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-1596

Publication date:
21/06/2022
Incorrect Permission Assignment for Critical Resource vulnerability in ABB REX640 PCL1, REX640 PCL2, REX640 PCL3 allows an authenticated attacker to launch an attack against the user database file and try to take control of an affected system node.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27872

Publication date:
21/06/2022
A maliciously crafted PDF file may be used to dereference a pointer for read or write operation while parsing PDF files in Autodesk Navisworks 2022. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception. An attacker can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27871

Publication date:
21/06/2022
Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27870

Publication date:
21/06/2022
A maliciously crafted TGA file in Autodesk AutoCAD 2023 may be used to write beyond the allocated buffer while parsing TGA file. This vulnerability may be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27869

Publication date:
21/06/2022
A maliciously crafted TIFF file in Autodesk AutoCAD 2023 can be forced to read and write beyond allocated boundaries when parsing the TIFF file. This vulnerability can be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27867

Publication date:
21/06/2022
A maliciously crafted JT file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27868

Publication date:
21/06/2022
A maliciously crafted CAT file in Autodesk AutoCAD 2023 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-23171

Publication date:
21/06/2022
AtlasVPN - Privilege Escalation Lack of proper security controls on named pipe messages can allow an attacker with low privileges to send a malicious payload and gain SYSTEM permissions on a windows computer where the AtlasVPN client is installed.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023