Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-1544

Publication date:
01/05/2022
Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2022

CVE-2021-41993

Publication date:
30/04/2022
A misconfiguration of RSA in PingID Android app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2021-41994

Publication date:
30/04/2022
A misconfiguration of RSA in PingID iOS app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2021-42001

Publication date:
30/04/2022
PingID Desktop prior to 1.7.3 has a misconfiguration in the encryption libraries which can lead to sensitive data exposure. An attacker capable of exploiting this vulnerability may be able to successfully complete an MFA challenge via OTP.
Severity CVSS v4.0: Pending analysis
Last modification:
17/07/2023

CVE-2021-41992

Publication date:
30/04/2022
A misconfiguration of RSA in PingID Windows Login prior to 2.7 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass.
Severity CVSS v4.0: Pending analysis
Last modification:
03/09/2022

CVE-2022-28323

Publication date:
30/04/2022
An issue was discovered in MediaWiki through 1.37.2. The SecurePoll extension allows a leak because sorting by timestamp is supported,
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-29265

Publication date:
30/04/2022
Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default property values: - EvaluateXPath - EvaluateXQuery - ValidateXml Apache NiFi flow configurations that include these Processors are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations in the default configuration for these Processors, and disallows XML External Entity resolution in standard services.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-29967

Publication date:
29/04/2022
static_compressed_inmemory_website_callback.c in Glewlwyd through 2.6.2 allows directory traversal.
Severity CVSS v4.0: Pending analysis
Last modification:
10/05/2022

CVE-2022-28198

Publication date:
29/04/2022
NVIDIA Omniverse Nucleus and Cache contain a vulnerability in its configuration of OpenSSL, where an attacker with physical access to the system can cause arbitrary code execution which can impact confidentiality, integrity, and availability.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-29947

Publication date:
29/04/2022
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
Severity CVSS v4.0: Pending analysis
Last modification:
11/05/2022

CVE-2022-25854

Publication date:
29/04/2022
This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the XSS payload.
Severity CVSS v4.0: Pending analysis
Last modification:
23/09/2022

CVE-2022-29945

Publication date:
29/04/2022
DJI drone devices sold in 2017 through 2022 broadcast unencrypted information about the drone operator's physical location via the AeroScope protocol.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023