Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22278

Publication date:
27/04/2022
A vulnerability in SonicOS CFS (Content filtering service) returns a large 403 forbidden HTTP response message to the source address when users try to access prohibited resource this allows an attacker to cause HTTP Denial of Service (DoS) attack
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2022

CVE-2021-25266

Publication date:
27/04/2022
An insecure data storage vulnerability allows a physical attacker with root privileges to retrieve TOTP secret keys from unlocked phones in Sophos Authenticator for Android version 3.4 and older, and Intercept X for Mobile (Android) before version 9.7.3495.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2022

CVE-2022-22276

Publication date:
27/04/2022
A vulnerability in SonicOS SNMP service resulting exposure of sensitive information to an unauthorized user.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2022

CVE-2022-23822

Publication date:
27/04/2022
In this physical attack, an attacker may potentially exploit the Zynq-7000 SoC First Stage Boot Loader (FSBL) by bypassing authentication and loading a malicious image onto the device. This in turn may further allow the attacker to perform additional attacks such as such as using the device as a decryption oracle. An anticipated mitigation via a 2022.1 patch will resolve the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022

CVE-2022-27336

Publication date:
27/04/2022
Seacms v11.6 was discovered to contain a remote code execution (RCE) vulnerability via the component /admin/weixin.php.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-38878

Publication date:
27/04/2022
IBM QRadar 7.3, 7.4, and 7.5 could allow a malicious actor to impersonate an actor due to key exchange without entity authentication. IBM X-Force ID: 208756.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-22521

Publication date:
27/04/2022
In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2024

CVE-2021-34601

Publication date:
27/04/2022
In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may use the password to gain administrative access to the web-UI.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2021-34602

Publication date:
27/04/2022
In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields that are executed with root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2021-34591

Publication date:
27/04/2022
In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-22345

Publication date:
27/04/2022
IBM QRadar 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 220041.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2022

CVE-2021-38939

Publication date:
27/04/2022
IBM QRadar SIEM 7.3, 7.4, and 7.5 stores potentially sensitive information in log files that could be read by an user with access to creating domains. IBM X-Force ID: 211037.
Severity CVSS v4.0: Pending analysis
Last modification:
04/05/2022