Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-3852

Publication date:
12/01/2022
growi is vulnerable to Authorization Bypass Through User-Controlled Key
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2022

CVE-2022-0179

Publication date:
12/01/2022
snipe-it is vulnerable to Missing Authorization
Severity CVSS v4.0: Pending analysis
Last modification:
29/06/2023

CVE-2022-0159

Publication date:
12/01/2022
orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Severity CVSS v4.0: Pending analysis
Last modification:
18/01/2022

CVE-2022-0087

Publication date:
12/01/2022
keystone is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Severity CVSS v4.0: Pending analysis
Last modification:
18/01/2022

CVE-2021-46283

Publication date:
11/01/2022
nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel before 5.12.13 allows local users to cause a denial of service (NULL pointer dereference and general protection fault) because of the missing initialization for nft_set_elem_expr_alloc. A local user can set a netfilter table expression in their own namespace.
Severity CVSS v4.0: Pending analysis
Last modification:
20/01/2022

CVE-2021-43999

Publication date:
11/01/2022
Apache Guacamole 1.2.0 and 1.3.0 do not properly validate responses received from a SAML identity provider. If SAML support is enabled, this may allow a malicious user to assume the identity of another Guacamole user.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2022

CVE-2021-41767

Publication date:
11/01/2022
Apache Guacamole 1.3.0 and older may incorrectly include a private tunnel identifier in the non-private details of some REST responses. This may allow an authenticated user who already has permission to access a particular connection to read from or interact with another user's active use of that same connection.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2022

CVE-2022-21646

Publication date:
11/01/2022
SpiceDB is a database system for managing security-critical application permissions. Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side of the exclusion. In `v1.3.0`, the wildcard is ignored entirely in lookup's dispatch, resulting in the `banned` wildcard being ignored in the exclusion. Version 1.4.0 contains a patch for this issue. As a workaround, don't make use of wildcards on the right side of intersections or within exclusions.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2023

CVE-2022-21964

Publication date:
11/01/2022
Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21969

Publication date:
11/01/2022
Microsoft Exchange Server Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21958

Publication date:
11/01/2022
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024

CVE-2022-21959

Publication date:
11/01/2022
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2024