Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22576

Publication date:
26/05/2022
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2023

CVE-2022-21831

Publication date:
26/05/2022
A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2023

CVE-2022-22577

Publication date:
26/05/2022
An XSS Vulnerability in Action Pack >= 5.2.0 and
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2023

CVE-2022-27777

Publication date:
26/05/2022
A XSS Vulnerability in Action View tag helpers >= 5.2.0 and
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2023

CVE-2021-33014

Publication date:
26/05/2022
An attacker can gain VxWorks Shell after login due to hard-coded credentials on a KUKA KR C4 control software for versions prior to 8.7 or any product running KSS.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2021-33016

Publication date:
26/05/2022
An attacker can gain full access (read/write/delete) to sensitive folders due to hard-coded credentials on KUKA KR C4 control software for versions prior to 8.7 or any product running KSS.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-1261

Publication date:
26/05/2022
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2022-21827

Publication date:
26/05/2022
An improper privilege vulnerability has been discovered in Citrix Gateway Plug-in for Windows (Citrix Secure Access for Windows)
Severity CVSS v4.0: Pending analysis
Last modification:
08/06/2022

CVE-2021-4232

Publication date:
26/05/2022
A vulnerability classified as problematic has been found in Zoo Management System 1.0. Affected is an unknown function of the file admin/manage-ticket.php. The manipulation with the input alert(1) leads to cross site scripting. It is possible to launch the attack remotely.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2023

CVE-2022-1899

Publication date:
26/05/2022
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2022

CVE-2022-1882

Publication date:
26/05/2022
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-30787

Publication date:
26/05/2022
An integer underflow in fuse_lib_readdir enables arbitrary memory read operations in NTFS-3G through 2021.8.22 when using libfuse-lite.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023