Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-41119

Publication date:
13/04/2022
Wire-server is the system server for the wire back-end services. Releases prior to v2022-03-01 are subject to a denial of service attack via a crafted object causing a hash collision. This collision causes the server to spend at least quadratic time parsing it which can lead to a denial of service for a heavily used server. The issue has been fixed in wire-server 2022-03-01 and is already deployed on all Wire managed services. On premise instances of wire-server need to be updated to 2022-03-01, so that their backends are no longer affected. There are no known workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-27846

Publication date:
13/04/2022
Cross-Site Request Forgery (CSRF) vulnerability in Yooslider Yoo Slider
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-27847

Publication date:
13/04/2022
Cross-Site Request Forgery (CSRF) vulnerability in Yooslider Yoo Slider
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-27523

Publication date:
13/04/2022
A buffer over-read can be exploited in Autodesk TrueView 2022 may lead to an exposure of sensitive information or a crash through using a maliciously crafted DWG file as an Input. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-27524

Publication date:
13/04/2022
An out-of-bounds read can be exploited in Autodesk TrueView 2022 may lead to an exposure of sensitive information or a crash through using a maliciously crafted DWG file as an Input. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-27505

Publication date:
13/04/2022
Reflected cross site scripting (XSS)
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-27503

Publication date:
13/04/2022
Cross-site Scripting (XSS) vulnerability in Citrix StoreFront affects version 1912 before CU5 and version 3.12 before CU9
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-27506

Publication date:
13/04/2022
Hard-coded credentials allow administrators to access the shell via the SD-WAN CLI
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2022

CVE-2022-25797

Publication date:
13/04/2022
A maliciously crafted PDF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to dereference for a write beyond the allocated buffer while parsing PDF files. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception.
Severity CVSS v4.0: Pending analysis
Last modification:
07/10/2022

CVE-2022-22959

Publication date:
13/04/2022
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability. A malicious actor can trick a user through a cross site request forgery to unintentionally validate a malicious JDBC URI.
Severity CVSS v4.0: Pending analysis
Last modification:
21/04/2022

CVE-2022-22960

Publication date:
13/04/2022
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2022-25795

Publication date:
13/04/2022
A Memory Corruption Vulnerability in Autodesk TrueView 2022 and 2021 may lead to remote code execution through maliciously crafted DWG files.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023