Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-21835

Publication date:
11/01/2022
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21837

Publication date:
11/01/2022
Microsoft SharePoint Server Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21839

Publication date:
11/01/2022
Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21840

Publication date:
11/01/2022
Microsoft Office Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21842

Publication date:
11/01/2022
Microsoft Word Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21843

Publication date:
11/01/2022
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21846

Publication date:
11/01/2022
Microsoft Exchange Server Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21847

Publication date:
11/01/2022
Windows Hyper-V Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21848

Publication date:
11/01/2022
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2021-43972

Publication date:
11/01/2022
An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2022

CVE-2021-43973

Publication date:
11/01/2022
An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2022

CVE-2021-43971

Publication date:
11/01/2022
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
19/01/2022