Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24551

Publication date:
06/02/2022
A flaw was found in StarWind Stack. The endpoint for setting a new password doesn’t check the current username and old password. An attacker could reset any local user password (including system/administrator user) using any available user This affects StarWind SAN and NAS v0.2 build 1633.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2022

CVE-2021-39280

Publication date:
06/02/2022
Certain Korenix JetWave devices allow authenticated users to execute arbitrary code as root via /syscmd.asp. This affects 2212X before 1.9.1, 2212S before 1.9.1, 2212G before 1.8, 3220 V3 before 1.5.1, 3420 V3 before 1.5.1, and 2311 through 2022-01-31.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-22831

Publication date:
06/02/2022
An issue was discovered in Servisnet Tessa 0.0.2. An attacker can add a new sysadmin user via a manipulation of the Authorization HTTP header.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2021-41816

Publication date:
06/02/2022
CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2024

CVE-2022-22832

Publication date:
06/02/2022
An issue was discovered in Servisnet Tessa 0.0.2. Authorization data is available via an unauthenticated /data-service/users/ request.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2007-20001

Publication date:
06/02/2022
A flaw was found in StarWind iSCSI target. An attacker could script standard iSCSI Initiator operation(s) to exhaust the StarWind service socket, which could lead to denial of service. This affects iSCSI SAN (Windows Native) Version 3.2.2 build 2007-02-20.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2013-20004

Publication date:
06/02/2022
A flaw was found in StarWind iSCSI target. StarWind service does not limit client connections and allocates memory on each connection attempt. An attacker could create a denial of service state by trying to connect a non-existent target multiple times. This affects iSCSI SAN (Windows Native) Version 6.0, build 2013-01-16.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2022

CVE-2022-23206

Publication date:
06/02/2022
In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-0502

Publication date:
06/02/2022
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2021-38172

Publication date:
05/02/2022
perM 0.4.0 has a Buffer Overflow related to strncpy. (Debian initially fixed this in 0.4.0-7.)
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-0501

Publication date:
05/02/2022
Cross-site Scripting (XSS) - Reflected in Packagist ptrofimov/beanstalk_console prior to 1.7.12.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-0437

Publication date:
05/02/2022
Cross-site Scripting (XSS) - DOM in NPM karma prior to 6.3.14.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022