Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-28464

Publication date:
27/04/2022
Apifox through 2.1.6 is vulnerable to Cross Site Scripting (XSS) which can lead to remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2022

CVE-2022-27905

Publication date:
27/04/2022
In ControlUp Real-Time Agent before 8.6, an unquoted path can result in privilege escalation. An attacker would require write permissions to the root level of the OS drive (C:\) to exploit this.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022

CVE-2022-24887

Publication date:
27/04/2022
Nextcloud Talk is a video and audio conferencing app for Nextcloud, a self-hosted productivity platform. Prior to versions 11.3.4, 12.2.2, and 13.0.0, when sharing a Deck card in conversation, the metaData can be manipulated so users can be tricked into opening arbitrary URLs. This issue is fixed in versions 11.3.4, 12.2.2, and 13.0.0. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022

CVE-2022-27239

Publication date:
27/04/2022
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
24/11/2023

CVE-2022-24886

Publication date:
27/04/2022
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. In versions prior to 3.19.0, any application with notification permission can access contacts if Nextcloud has access to Contacts without applying for the Contacts permission itself. Version 3.19.0 contains a fix for this issue. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
06/07/2023

CVE-2022-24885

Publication date:
27/04/2022
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.1, users can bypass a lock on the Nextcloud app on an Android device by repeatedly reopening the app. Version 3.19.1 contains a fix for the problem. There are currently no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2022

CVE-2021-46423

Publication date:
27/04/2022
Telesquare TLR-2005KSH 1.0.0 is affected by an unauthenticated file download vulnerability that allows a remote attacker to download a full configuration file.
Severity CVSS v4.0: Pending analysis
Last modification:
09/05/2022

CVE-2021-46424

Publication date:
27/04/2022
Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2021-46422

Publication date:
27/04/2022
Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2022

CVE-2021-46442

Publication date:
27/04/2022
In the "webupg" binary of D-Link DIR-825 G1, attackers can bypass authentication through parameters "autoupgrade.asp", and perform functions such as downloading configuration files and updating firmware without authorization.
Severity CVSS v4.0: Pending analysis
Last modification:
07/05/2022

CVE-2022-1504

Publication date:
27/04/2022
XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2022

CVE-2021-46420

Publication date:
27/04/2022
Franklin Fueling Systems FFS TS-550 evo 2.23.4.8936 is affected by an unauthenticated directory traversal vulnerability, which allows an attacker to obtain sensitive information.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2022