Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-26676

Publication date:
07/04/2022
aEnrich a+HRD has inadequate privilege restrictions, an unauthenticated remote attacker can use the API function to upload and execute malicious scripts to control the system or disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-26675

Publication date:
07/04/2022
aEnrich a+HRD has inadequate filtering for special characters in URLs. An unauthenticated remote attacker can bypass authentication and perform path traversal attacks to access arbitrary files under website root directory.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-26671

Publication date:
07/04/2022
Taiwan Secom Dr.ID Access Control system’s login page has a hard-coded credential in the source code. An unauthenticated remote attacker can use the hard-coded credential to acquire partial system information and modify system setting to cause partial disrupt of service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-26670

Publication date:
07/04/2022
D-Link DIR-878 has inadequate filtering for special characters in the webpage input field. An unauthenticated LAN attacker can perform command injection attack to execute arbitrary system commands to control the system or disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-25594

Publication date:
07/04/2022
Microprogram’s parking lot management system is vulnerable to sensitive information exposure. An unauthorized remote attacker can input specific URLs to acquire partial system configuration information.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-25596

Publication date:
07/04/2022
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-25595

Publication date:
07/04/2022
ASUS RT-AC86U has improper user request handling, which allows an unauthenticated LAN attacker to cause a denial of service by sending particular request a server-to-client reply attempt.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-23973

Publication date:
07/04/2022
ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-23970

Publication date:
07/04/2022
ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another file with the same file name, which results in service disruption.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-23971

Publication date:
07/04/2022
ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-22517

Publication date:
07/04/2022
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2022

CVE-2022-23972

Publication date:
07/04/2022
ASUS RT-AX56U’s SQL handling function has an SQL injection vulnerability due to insufficient user input validation. An unauthenticated LAN attacker to inject arbitrary SQL code to read, modify and delete database.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022