Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-2582

Publication date:
27/12/2022
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2022-2583

Publication date:
27/12/2022
A race condition can cause incorrect HTTP request routing.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2021-4236

Publication date:
27/12/2022
Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2022-2584

Publication date:
27/12/2022
The dag-pb codec can panic when decoding invalid blocks.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2018-25046

Publication date:
27/12/2022
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2019-25073

Publication date:
27/12/2022
Improper path sanitization in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36559

Publication date:
27/12/2022
Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36560

Publication date:
27/12/2022
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36561

Publication date:
27/12/2022
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2020-36566

Publication date:
27/12/2022
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2016-15005

Publication date:
27/12/2022
CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025

CVE-2021-4235

Publication date:
27/12/2022
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
Severity CVSS v4.0: Pending analysis
Last modification:
11/04/2025