Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-36056

Publication date:
31/01/2022
Beetel 777VR1-DI Hardware Version REV.1.01 Firmware Version V01.00.09_55 was discovered to contain a cross-site scripting (XSS) vulnerability via the Ping diagnostic option.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2022

CVE-2021-44255

Publication date:
31/01/2022
Authenticated remote code execution in MotionEye
Severity CVSS v4.0: Pending analysis
Last modification:
12/07/2022

CVE-2021-23520

Publication date:
31/01/2022
The package juce-framework/juce before 6.1.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) via the ZipFile::uncompressEntry function in juce_ZipFile.cpp. This vulnerability is triggered when the archive is extracted upon calling uncompressTo() on a ZipFile object.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2022

CVE-2021-23521

Publication date:
31/01/2022
This affects the package juce-framework/JUCE before 6.1.5. This vulnerability is triggered when a malicious archive is crafted with an entry containing a symbolic link. When extracted, the symbolic link is followed outside of the target dir allowing writing arbitrary files on the target host. In some cases, this can allow an attacker to execute arbitrary code. The vulnerable code is in the ZipFile::uncompressEntry function in juce_ZipFile.cpp and is executed when the archive is extracted upon calling uncompressTo() on a ZipFile object.
Severity CVSS v4.0: Pending analysis
Last modification:
07/02/2022

CVE-2022-0414

Publication date:
31/01/2022
Improper Validation of Specified Quantity in Input in Packagist dolibarr/dolibarr prior to 16.0.
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2022-23409

Publication date:
31/01/2022
The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2022

CVE-2021-34805

Publication date:
31/01/2022
An issue was discovered in FAUST iServer before 9.0.019.019.7. For each URL request, it accesses the corresponding .fau file on the operating system without preventing %2e%2e%5c directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2022

CVE-2021-27971

Publication date:
31/01/2022
Alps Alpine Touchpad Driver 10.3201.101.215 is vulnerable to DLL Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2023

CVE-2021-45079

Publication date:
31/01/2022
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-24130

Publication date:
31/01/2022
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0408

Publication date:
30/01/2022
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0413

Publication date:
30/01/2022
Use After Free in GitHub repository vim/vim prior to 8.2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023