Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-25375

Publication date:
20/02/2022
An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-23848

Publication date:
20/02/2022
In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
28/02/2022

CVE-2022-23054

Publication date:
20/02/2022
Openmct versions 1.3.0 to 1.7.7 are vulnerable against stored XSS via the “Summary Widget” element, that allows the injection of malicious JavaScript into the ‘URL’ field. This issue affects: nasa openmct 1.7.7 version and prior versions; 1.3.0 version and later versions.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2022

CVE-2022-23053

Publication date:
20/02/2022
Openmct versions 1.3.0 to 1.7.7 are vulnerable against stored XSS via the “Condition Widget” element, that allows the injection of malicious JavaScript into the ‘URL’ field. This issue affects: nasa openmct 1.7.7 version and prior versions; 1.3.0 version and later versions.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2022

CVE-2022-22126

Publication date:
20/02/2022
Openmct versions 1.3.0 to 1.7.7 are vulnerable against stored XSS via the “Web Page” element, that allows the injection of malicious JavaScript into the ‘URL’ field. This issue affects: nasa openmct 1.7.7 version and prior versions; 1.3.0 version and later versions.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2022

CVE-2021-45083

Publication date:
20/02/2022
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. In the case of an easy-to-guess password, it's trivial to obtain the plaintext string. The settings.yaml file contains secrets such as the hashed default password.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-45081

Publication date:
20/02/2022
An issue was discovered in Cobbler through 3.3.1. Routines in several files use the HTTP protocol instead of the more secure HTTPS.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-0688

Publication date:
20/02/2022
Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.
Severity CVSS v4.0: Pending analysis
Last modification:
28/02/2022

CVE-2022-0686

Publication date:
20/02/2022
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2023

CVE-2021-45007

Publication date:
20/02/2022
Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users
Severity CVSS v4.0: Pending analysis
Last modification:
04/08/2024

CVE-2022-0685

Publication date:
20/02/2022
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-46700

Publication date:
19/02/2022
In libsixel 1.8.6, sixel_encoder_output_without_macro (called from sixel_encoder_encode_frame in encoder.c) has a double free.
Severity CVSS v4.0: Pending analysis
Last modification:
01/03/2022