Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24716

Publication date:
08/03/2022
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
Severity CVSS v4.0: Pending analysis
Last modification:
10/04/2023

CVE-2022-24713

Publication date:
08/03/2022
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-41241

Publication date:
08/03/2022
Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2022

CVE-2021-41180

Publication date:
08/03/2022
Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
15/03/2022

CVE-2021-41181

Publication date:
08/03/2022
Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2022

CVE-2021-41239

Publication date:
08/03/2022
Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
24/10/2022

CVE-2022-0877

Publication date:
08/03/2022
Cross-site Scripting (XSS) - Stored in GitHub repository bookstackapp/bookstack prior to v22.02.3.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2022

CVE-2022-24408

Publication date:
08/03/2022
A vulnerability has been identified in SINUMERIK MC (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2022

CVE-2022-24661

Publication date:
08/03/2022
A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2022

CVE-2022-26313

Publication date:
08/03/2022
A vulnerability has been identified in Mendix Forgot Password Appstore module (All versions >= V3.3.0
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2022

CVE-2022-26314

Publication date:
08/03/2022
A vulnerability has been identified in Mendix Forgot Password Appstore module (All versions >= V3.3.0
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2022

CVE-2022-26317

Publication date:
08/03/2022
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2023