Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-25806

Publication date:
09/06/2022
An issue was discovered in the IGEL Universal Management Suite (UMS) 6.07.100. A hardcoded DES key in the PrefDBCredentials class allows an attacker, who has discovered encrypted superuser credentials, to decrypt those credentials using a static 8-byte DES key.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-29014

Publication date:
09/06/2022
A local file inclusion vulnerability in Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-29013

Publication date:
09/06/2022
A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-31496

Publication date:
09/06/2022
LibreHealth EHR Base 2.0.0 allows incorrect interface/super/manage_site_files.php access.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-30882

Publication date:
08/06/2022
pyanxdns package in PyPI version 0.2 is vulnerable to code execution backdoor. The impact is: execute arbitrary code (remote). When installing the pyanxdns package of version 0.2, the request package will be installed.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2022-31313

Publication date:
08/06/2022
api-res-py package in PyPI 0.1 is vulnerable to a code execution backdoor in the request package.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2021-40589

Publication date:
08/06/2022
ZAngband zangband-data 2.7.5 is affected by an integer underflow vulnerability in src/tk/plat.c through the variable fileheader.bfOffBits.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2021-40592

Publication date:
08/06/2022
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2023

CVE-2022-30877

Publication date:
08/06/2022
The keep for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-28386

Publication date:
08/06/2022
An issue was discovered in certain Verbatim drives through 2022-03-31. The security feature for lockout (e.g., requiring a reformat of the drive after 20 failed unlock attempts) does not work as specified. More than 20 attempts may be made. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428 and Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0.
Severity CVSS v4.0: Pending analysis
Last modification:
06/12/2022

CVE-2022-30875

Publication date:
08/06/2022
Dolibarr 12.0.5 is vulnerable to Cross Site Scripting (XSS) via Sql Error Page.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-28385

Publication date:
08/06/2022
An issue was discovered in certain Verbatim drives through 2022-03-31. Due to missing integrity checks, an attacker can manipulate the content of the emulated CD-ROM drive (containing the Windows and macOS client software). The content of this emulated CD-ROM drive is stored as an ISO-9660 image in the hidden sectors of the USB drive, that can only be accessed using special IOCTL commands, or when installing the drive in an external disk enclosure. By manipulating this ISO-9660 image or replacing it with another one, an attacker is able to store malicious software on the emulated CD-ROM drive. This software may get executed by an unsuspecting victim when using the device. For example, an attacker with temporary physical access during the supply chain could program a modified ISO-9660 image on a device that always accepts an attacker-controlled password for unlocking the device. If the attacker later on gains access to the used USB drive, he can simply decrypt all contained user data. Storing arbitrary other malicious software is also possible. This affects Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1 and Fingerprint Secure Portable Hard Drive Part Number #53650.
Severity CVSS v4.0: Pending analysis
Last modification:
21/06/2022