Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-8562

Publication date:
01/02/2022
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.
Severity CVSS v4.0: Pending analysis
Last modification:
29/03/2022

CVE-2022-23774

Publication date:
01/02/2022
Docker Desktop before 4.4.4 on Windows allows attackers to move arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
04/02/2022

CVE-2021-3534

Publication date:
01/02/2022
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-34981. Reason: This candidate is a reservation duplicate of CVE-2021-34981. Notes: All CVE users should reference CVE-2021-34981 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46666

Publication date:
01/02/2022
MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2022

CVE-2021-46668

Publication date:
01/02/2022
MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46669

Publication date:
01/02/2022
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46667

Publication date:
01/02/2022
MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46662

Publication date:
01/02/2022
MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.
Severity CVSS v4.0: Pending analysis
Last modification:
13/04/2022

CVE-2021-46665

Publication date:
01/02/2022
MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46664

Publication date:
01/02/2022
MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46661

Publication date:
01/02/2022
MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46663

Publication date:
01/02/2022
MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023