Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-31624

Publication date:
25/05/2022
MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-26026

Publication date:
25/05/2022
A denial of service vulnerability exists in the OAS Engine SecureConfigValues functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted network request can lead to loss of communications. An attacker can send a network request to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/07/2023

CVE-2022-26043

Publication date:
25/05/2022
An external config control vulnerability exists in the OAS Engine SecureAddSecurity functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to the creation of a custom Security Group. An attacker can send a sequence of requests to trigger this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/07/2023

CVE-2022-29402

Publication date:
25/05/2022
TP-Link TL-WR840N EU v6.20 was discovered to contain insecure protections for its UART console. This vulnerability allows attackers to connect to the UART port via a serial connection and execute commands as the root user without authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2022

CVE-2022-29248

Publication date:
25/05/2022
Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2021-27783

Publication date:
25/05/2022
User generated PPKG file for Bulk Enroll may have unencrypted sensitive information exposed.
Severity CVSS v4.0: Pending analysis
Last modification:
07/06/2022

CVE-2021-27779

Publication date:
25/05/2022
VersionVault Express exposes sensitive information that an attacker can use to impersonate the server or eavesdrop on communications with the server.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-29408

Publication date:
25/05/2022
Persistent Cross-Site Scripting (XSS) vulnerability in Vsourz Digital's Advanced Contact form 7 DB plugin
Severity CVSS v4.0: Pending analysis
Last modification:
01/06/2022

CVE-2022-28875

Publication date:
25/05/2022
A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-30427

Publication date:
25/05/2022
In ginadmin through 05-10-2022 the incoming path value is not filtered, resulting in directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-30428

Publication date:
25/05/2022
In ginadmin through 05-10-2022, the incoming path value is not filtered, resulting in arbitrary file reading.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-27305

Publication date:
25/05/2022
Gibbon v23 does not generate a new session ID cookie after a user authenticates, making the application vulnerable to session fixation.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022