Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-0525

Publication date:
09/02/2022
Out-of-bounds Read in Homebrew mruby prior to 3.2.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-24682

Publication date:
09/02/2022
An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2022-24676

Publication date:
09/02/2022
update_code in Admin.php in HYBBS2 through 2.3.2 allows arbitrary file upload via a crafted ZIP archive.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-24677

Publication date:
09/02/2022
Admin.php in HYBBS2 through 2.3.2 allows remote code execution because it writes plugin-related configuration information to conf.php.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2021-45919

Publication date:
08/02/2022
Studio 42 elFinder through 2.1.31 allows XSS via an SVG document.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2021-45329

Publication date:
08/02/2022
Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-23627

Publication date:
08/02/2022
ArchiSteamFarm (ASF) is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code, introduced in version V5.2.2.2, the program didn't adequately verify effective access of the user sending proxy (i.e. `[Bots]`) commands. In particular, a proxy-like command sent to bot `A` targeting bot `B` has incorrectly verified user's access against bot `A` - instead of bot `B`, to which the command was originally designated. This in result allowed access to resources beyond those configured, being a security threat affecting confidentiality of other bot instances. A successful attack exploiting this bug requires a significant access granted explicitly by original owner of the ASF process prior to that, as attacker has to control at least a single bot in the process to make use of this inadequate access verification loophole. The issue is patched in ASF V5.2.2.5, V5.2.3.2 and future versions. Users are advised to update as soon as possible.
Severity CVSS v4.0: Pending analysis
Last modification:
16/02/2022

CVE-2022-0524

Publication date:
08/02/2022
Business Logic Errors in GitHub repository publify/publify prior to 9.2.7.
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2022

CVE-2022-23626

Publication date:
08/02/2022
m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/07/2023

CVE-2022-0522

Publication date:
08/02/2022
Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-21703

Publication date:
08/02/2022
Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0523

Publication date:
08/02/2022
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023