Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-23926

Publication date:
11/03/2022
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2022

CVE-2022-23925

Publication date:
11/03/2022
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2022

CVE-2022-23731

Publication date:
11/03/2022
V8 javascript engine (heap vulnerability) can cause privilege escalation ,which can impact on some webOS TV models.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2022

CVE-2022-23924

Publication date:
11/03/2022
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products which may allow Escalation of Privilege, Arbitrary Code Execution, Unauthorized Code Execution, Denial of Service, and Information Disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2022

CVE-2022-23730

Publication date:
11/03/2022
The public API error causes for the attacker to be able to bypass API access control.
Severity CVSS v4.0: Pending analysis
Last modification:
03/07/2023

CVE-2022-23625

Publication date:
11/03/2022
Wire-ios is a messaging application using the wire protocol on apple's ios platform. In versions prior to 3.95 malformed resource identifiers may render the iOS Wire Client completely unusable by causing it to repeatedly crash on launch. These malformed resource identifiers can be generated and sent between Wire users. The root cause lies in [wireapp/wire-ios-transport](https://github.com/wireapp/wire-ios-transport), where code responsible for removing sensible tokens before logging may fail and lead to a crash (Swift exception) of the application. This causes undesirable behavior, however the (greater) Wire system is still functional. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2022

CVE-2022-23187

Publication date:
11/03/2022
Adobe Illustrator version 26.0.3 (and earlier) is affected by a buffer overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Illustrator.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2022

CVE-2022-0924

Publication date:
11/03/2022
Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0921

Publication date:
11/03/2022
Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2022

CVE-2022-0909

Publication date:
11/03/2022
Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0908

Publication date:
11/03/2022
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-0907

Publication date:
11/03/2022
Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023