Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-33948

Publication date:
04/07/2022
HOME SPOT CUBE2 V102 contains an OS command injection vulnerability due to improper processing of data received from DHCP server. An adjacent attacker may execute an arbitrary OS command on the product if a malicious DHCP server is placed on the WAN side of the product.
Severity CVSS v4.0: Pending analysis
Last modification:
15/07/2022

CVE-2022-32284

Publication date:
04/07/2022
Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YOKOGAWA Wide Area Communication Router (WAC Router) AW810D, which may allow a remote attacker to cause denial-of-service (DoS) condition by sending a specially crafted packet.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2022

CVE-2022-34151

Publication date:
04/07/2022
Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-2289

Publication date:
03/07/2022
Use After Free in GitHub repository vim/vim prior to 9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2288

Publication date:
03/07/2022
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2290

Publication date:
03/07/2022
Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2022-2287

Publication date:
02/07/2022
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-34913

Publication date:
02/07/2022
md2roff 1.7 has a stack-based buffer overflow via a Markdown file containing a large number of consecutive characters to be processed. NOTE: the vendor's position is that the product is not intended for untrusted input
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2022-34911

Publication date:
02/07/2022
An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to "Welcome" followed by the username, the username is not escaped: SpecialCreateAccount::successfulAction() calls ::showSuccessPage() with a message as second parameter, and OutputPage::setPageTitle() uses text().
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-34912

Publication date:
02/07/2022
An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1.38.1. The contributions-title, used on Special:Contributions, is used as page title without escaping. Hence, in a non-default configuration where a username contains HTML entities, it won't be escaped.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2286

Publication date:
02/07/2022
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-2285

Publication date:
02/07/2022
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023