Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22519

Publication date:
07/04/2022
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-22513

Publication date:
07/04/2022
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-22514

Publication date:
07/04/2022
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-22515

Publication date:
07/04/2022
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2022-22518

Publication date:
07/04/2022
A bug in CmpUserMgr component can lead to only partially applied security policies. This can result in enabled, anonymous access to components part of the applied security policy.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2022-0935

Publication date:
07/04/2022
Host Header injection in password Reset in GitHub repository livehelperchat/livehelperchat prior to 3.97.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2022-22516

Publication date:
07/04/2022
The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2022

CVE-2022-26612

Publication date:
07/04/2022
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-25597

Publication date:
07/04/2022
ASUS RT-AC86U’s LPD service has insufficient filtering for special characters in the user request, which allows an unauthenticated LAN attacker to perform command injection attack, execute arbitrary commands and disrupt or terminate service.
Severity CVSS v4.0: Pending analysis
Last modification:
23/06/2023

CVE-2022-0677

Publication date:
07/04/2022
Improper Handling of Length Parameter Inconsistency vulnerability in the Update Server component of Bitdefender Endpoint Security Tools (in relay role), GravityZone (in Update Server role) allows an attacker to cause a Denial-of-Service. This issue affects: Bitdefender Update Server versions prior to 3.4.0.276. Bitdefender GravityZone versions prior to 26.4-1. Bitdefender Endpoint Security Tools for Linux versions prior to 6.2.21.171. Bitdefender Endpoint Security Tools for Windows versions prior to 7.4.1.111.
Severity CVSS v4.0: Pending analysis
Last modification:
14/04/2022

CVE-2021-43432

Publication date:
07/04/2022
A Cross Site Scripting (XSS) vulnerability exists in Exrick XMall Admin Panel as of 11/7/2021 via the GET parameter in product-add.jsp.
Severity CVSS v4.0: Pending analysis
Last modification:
14/02/2024

CVE-2021-43430

Publication date:
07/04/2022
An Access Control vulnerability exists in BigAntSoft BigAnt office messenger 5.6 via im_webserver, which could let a malicious user upload PHP Trojan files.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2022