Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-27872

Publication date:
21/06/2022
A maliciously crafted PDF file may be used to dereference a pointer for read or write operation while parsing PDF files in Autodesk Navisworks 2022. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception. An attacker can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27871

Publication date:
21/06/2022
Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27870

Publication date:
21/06/2022
A maliciously crafted TGA file in Autodesk AutoCAD 2023 may be used to write beyond the allocated buffer while parsing TGA file. This vulnerability may be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27869

Publication date:
21/06/2022
A maliciously crafted TIFF file in Autodesk AutoCAD 2023 can be forced to read and write beyond allocated boundaries when parsing the TIFF file. This vulnerability can be exploited to execute arbitrary code.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27867

Publication date:
21/06/2022
A maliciously crafted JT file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-27868

Publication date:
21/06/2022
A maliciously crafted CAT file in Autodesk AutoCAD 2023 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2022

CVE-2022-23171

Publication date:
21/06/2022
AtlasVPN - Privilege Escalation Lack of proper security controls on named pipe messages can allow an attacker with low privileges to send a malicious payload and gain SYSTEM permissions on a windows computer where the AtlasVPN client is installed.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-1665

Publication date:
21/06/2022
A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code.
Severity CVSS v4.0: Pending analysis
Last modification:
18/08/2022

CVE-2022-33055

Publication date:
21/06/2022
Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/trains/manage_train.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2022-33056

Publication date:
21/06/2022
Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/schedules/manage_schedule.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2022-33049

Publication date:
21/06/2022
Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/?page=user/manage_user.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022

CVE-2022-33048

Publication date:
21/06/2022
Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/reservations/view_details.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/06/2022