Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-22010

Publication date:
09/03/2022
Media Foundation Information Disclosure Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2022-23253

Publication date:
09/03/2022
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2022-23265

Publication date:
09/03/2022
Microsoft Defender for IoT Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2021-36777

Publication date:
09/03/2022
A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2023

CVE-2022-21967

Publication date:
09/03/2022
Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-0896

Publication date:
09/03/2022
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2022

CVE-2022-0482

Publication date:
09/03/2022
Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.
Severity CVSS v4.0: Pending analysis
Last modification:
03/06/2022

CVE-2022-0881

Publication date:
09/03/2022
Insecure Storage of Sensitive Information in GitHub repository chocobozzz/peertube prior to 4.1.1.
Severity CVSS v4.0: Pending analysis
Last modification:
11/03/2022

CVE-2022-25943

Publication date:
09/03/2022
The installer of WPS Office for Windows versions prior to v11.2.0.10258 fails to configure properly the ACL for the directory where the service program is installed.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2022

CVE-2022-24739

Publication date:
08/03/2022
alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2022

CVE-2022-26337

Publication date:
08/03/2022
Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an attacker to use a specially crafted file to exploit the vulnerability and escalate local privileges on the affected machine.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2022

CVE-2022-26319

Publication date:
08/03/2022
An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
19/03/2022