Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24291

Publication date:
23/03/2022
Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2022-24292

Publication date:
23/03/2022
Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2022-24293

Publication date:
23/03/2022
Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2022-0834

Publication date:
23/03/2022
The Amelia WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the lastName parameter found in the ~/src/Application/Controller/User/Customer/AddCustomerController.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user accesses the booking calendar with the date the attacker has injected the malicious payload into. This affects versions up to and including 1.0.46.
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2024

CVE-2022-0750

Publication date:
23/03/2022
The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2021-4219

Publication date:
23/03/2022
A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system.
Severity CVSS v4.0: Pending analysis
Last modification:
30/03/2022

CVE-2022-22952

Publication date:
23/03/2022
VMware Carbon Black App Control (8.5.x prior to 8.5.14, 8.6.x prior to 8.6.6, 8.7.x prior to 8.7.4 and 8.8.x prior to 8.8.2) contains a file upload vulnerability. A malicious actor with administrative access to the VMware App Control administration interface may be able to execute code on the Windows instance where AppC Server is installed by uploading a specially crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
31/03/2022

CVE-2022-0888

Publication date:
23/03/2022
The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/includes/ajax/controllers/uploads.php file which can be bypassed making it possible for unauthenticated attackers to upload malicious files that can be used to obtain remote code execution, in versions up to and including 3.3.0
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2024

CVE-2022-0889

Publication date:
23/03/2022
The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to reflected cross-site scripting due to missing sanitization of the files filename parameter found in the ~/includes/ajax/controllers/uploads.php file which can be used by unauthenticated attackers to add malicious web scripts to vulnerable WordPress sites, in versions up to and including 3.3.12.
Severity CVSS v4.0: Pending analysis
Last modification:
11/01/2024

CVE-2021-4150

Publication date:
23/03/2022
A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.
Severity CVSS v4.0: Pending analysis
Last modification:
22/06/2022

CVE-2022-0854

Publication date:
23/03/2022
A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2022

CVE-2021-4197

Publication date:
23/03/2022
An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023