Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2007-20001

Publication date:
06/02/2022
A flaw was found in StarWind iSCSI target. An attacker could script standard iSCSI Initiator operation(s) to exhaust the StarWind service socket, which could lead to denial of service. This affects iSCSI SAN (Windows Native) Version 3.2.2 build 2007-02-20.
Severity CVSS v4.0: Pending analysis
Last modification:
21/11/2024

CVE-2013-20004

Publication date:
06/02/2022
A flaw was found in StarWind iSCSI target. StarWind service does not limit client connections and allocates memory on each connection attempt. An attacker could create a denial of service state by trying to connect a non-existent target multiple times. This affects iSCSI SAN (Windows Native) Version 6.0, build 2013-01-16.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2022

CVE-2022-23206

Publication date:
06/02/2022
In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-0502

Publication date:
06/02/2022
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2021-38172

Publication date:
05/02/2022
perM 0.4.0 has a Buffer Overflow related to strncpy. (Debian initially fixed this in 0.4.0-7.)
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-0501

Publication date:
05/02/2022
Cross-site Scripting (XSS) - Reflected in Packagist ptrofimov/beanstalk_console prior to 1.7.12.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-0437

Publication date:
05/02/2022
Cross-site Scripting (XSS) - DOM in NPM karma prior to 6.3.14.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2022-24115

Publication date:
04/02/2022
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2022-24114

Publication date:
04/02/2022
Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2022-23980

Publication date:
04/02/2022
Cross-Site Scripting (XSS) vulnerability discovered in Yasr – Yet Another Stars Rating WordPress plugin (versions
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2022-23805

Publication date:
04/02/2022
A security out-of-bounds read information disclosure vulnerability in Trend Micro Worry-Free Business Security Server could allow a local attacker to send garbage data to a specific named pipe and crash the server. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022

CVE-2022-23587

Publication date:
04/02/2022
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow is vulnerable to an integer overflow during cost estimation for crop and resize. Since the cropping parameters are user controlled, a malicious person can trigger undefined behavior. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Severity CVSS v4.0: Pending analysis
Last modification:
10/02/2022