Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-25321

Publication date:
18/02/2022
An issue was discovered in Cerebrate through 1.4. XSS could occur in the bookmarks component.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2023

CVE-2022-25320

Publication date:
18/02/2022
An issue was discovered in Cerebrate through 1.4. Username enumeration could occur.
Severity CVSS v4.0: Pending analysis
Last modification:
21/12/2023

CVE-2022-25318

Publication date:
18/02/2022
An issue was discovered in Cerebrate through 1.4. An incorrect sharing group ACL allowed an unprivileged user to edit and modify sharing groups.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2023

CVE-2022-25314

Publication date:
18/02/2022
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-25315

Publication date:
18/02/2022
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-25313

Publication date:
18/02/2022
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
Severity CVSS v4.0: Pending analysis
Last modification:
30/05/2025

CVE-2021-46108

Publication date:
18/02/2022
D-Link DSL-2730E CT-20131125 devices allow XSS via the username parameter to the password page in the maintenance configuration.
Severity CVSS v4.0: Pending analysis
Last modification:
05/04/2022

CVE-2022-22922

Publication date:
18/02/2022
TP-Link TL-WA850RE Wi-Fi Range Extender before v6_200923 was discovered to use highly predictable and easily detectable session keys, allowing attackers to gain administrative privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2021-41599

Publication date:
18/02/2022
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.21, 3.1.13, 3.2.5. This vulnerability was reported via the GitHub Bug Bounty program.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-3155

Publication date:
17/02/2022
snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2022

CVE-2021-44730

Publication date:
17/02/2022
snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-4120

Publication date:
17/02/2022
snapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023