Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-22644

Publication date:
28/07/2022
Ovarro TBox TWinSoft uses the custom hardcoded user “TWinSoft” with a hardcoded key.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2021-22646

Publication date:
28/07/2022
The “ipk” package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2021-22640

Publication date:
28/07/2022
An attacker can decrypt the Ovarro TBox login password by communication capture and brute force attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2022-2553

Publication date:
28/07/2022
The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-35882

Publication date:
28/07/2022
Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in GS Plugins GS Testimonial Slider plugin
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2022

CVE-2022-27509

Publication date:
28/07/2022
Unauthenticated redirection to a malicious website
Severity CVSS v4.0: Pending analysis
Last modification:
05/08/2022

CVE-2022-37010

Publication date:
28/07/2022
In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-37009

Publication date:
28/07/2022
In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-36364

Publication date:
28/07/2022
Apache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via `httpclient_impl` connection property; however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare cases remote code execution. To exploit the vulnerability: 1) the attacker needs to have privileges to control JDBC connection parameters; 2) and there should be a vulnerable class (constructor with URL parameter and ability to execute code) in the classpath. From Apache Calcite Avatica 1.22.0 onwards, it will be verified that the class implements the expected interface before invoking its constructor.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-27611

Publication date:
28/07/2022
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology Audio Station before 6.5.4-3367 allows remote authenticated users to delete arbitrary files via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2022

CVE-2022-27614

Publication date:
28/07/2022
Exposure of sensitive information to an unauthorized actor vulnerability in web server in Synology Media Server before 1.8.1-2876 allows remote attackers to obtain sensitive information via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2022-27612

Publication date:
28/07/2022
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Audio Station before 6.5.4-3367 allows remote attackers to execute arbitrary commands via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2023