Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22899

Publication date:
17/02/2022
Core FTP / SFTP Server v2 Build 725 was discovered to allow unauthenticated attackers to cause a Denial of Service (DoS) via a crafted packet through the SSH service.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-46368

Publication date:
17/02/2022
TRIGONE Remote System Monitor 3.61 is vulnerable to an unquoted path service allowing local users to launch processes with elevated privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2022-0629

Publication date:
17/02/2022
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0623

Publication date:
17/02/2022
Out-of-bounds Read in Homebrew mruby prior to 3.2.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2022

CVE-2022-24953

Publication date:
17/02/2022
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-22901

Publication date:
17/02/2022
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at parser_parse_function_arguments in /js/js-parser.c of JerryScript commit a6ab5e9.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2022-0622

Publication date:
17/02/2022
Generation of Error Message Containing Sensitive Information in Packagist snipe/snipe-it prior to 5.3.11.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2022-25270

Publication date:
17/02/2022
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2022-25271

Publication date:
16/02/2022
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2022

CVE-2022-24984

Publication date:
16/02/2022
Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2022-24985

Publication date:
16/02/2022
Forms generated by JQueryForm.com before 2022-02-05 allows a remote authenticated attacker to bypass authentication and access the administrative section of other forms hosted on the same web server. This is relevant only when an organization hosts more than one of these forms on their server.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-24981

Publication date:
16/02/2022
A reflected cross-site scripting (XSS) vulnerability in forms generated by JQueryForm.com before 2022-02-05 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter to admin.php.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022