Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-30791

Publication date:
11/07/2022
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2022

CVE-2022-1794

Publication date:
11/07/2022
The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2022-29926

Publication date:
11/07/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation in Cybozu, Inc. showed that it was not a vulnerability. Notes: https://jvn.jp/en/jp/JVN14077132
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2368

Publication date:
11/07/2022
Authentication Bypass by Spoofing in GitHub repository microweber/microweber prior to 1.2.20.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
10/07/2023

CVE-2022-35416

Publication date:
11/07/2022
H3C SSL VPN through 2022-07-10 allows wnm/login/login.json svpnlang cookie XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-32294

Publication date:
11/07/2022
Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-35414

Publication date:
11/07/2022
softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considered security bugs at this time.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-31576

Publication date:
11/07/2022
The heidi-luong1109/shackerpanel repository through 2021-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-31580

Publication date:
11/07/2022
The sanojtharindu/caretakerr-api repository through 2021-05-17 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-31577

Publication date:
11/07/2022
The longmaoteamtf/audio_aligner_app repository through 2020-01-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-31578

Publication date:
11/07/2022
The piaoyunsoft/bt_lnmp repository through 2019-10-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-31579

Publication date:
11/07/2022
The ralphjzhang/iasset repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022