Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24830

Publication date:
14/05/2022
OpenClinica is an open source software for Electronic Data Capture (EDC) and Clinical Data Management (CDM). OpenClinica prior to version 3.16 is vulnerable to path traversal in multiple endpoints, leading to arbitrary file read/write, and potential remote code execution. There are no known workarounds. This issue has been patched and users are recommended to upgrade.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-21190

Publication date:
13/05/2022
This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-25862

Publication date:
13/05/2022
This affects the package sds from 0.0.0. The library could be tricked into adding or modifying properties of the Object.prototype by abusing the set function located in js/set.js. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-7618](https://security.snyk.io/vuln/SNYK-JS-SDS-564123)
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-22281

Publication date:
13/05/2022
A buffer overflow vulnerability in the SonicWall SSL-VPN NetExtender Windows Client (32 and 64 bit) in 10.2.322 and earlier versions, allows an attacker to potentially execute arbitrary code in the host windows operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
24/05/2022

CVE-2022-25865

Publication date:
13/05/2022
The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-22282

Publication date:
13/05/2022
SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions incorrectly restricts access to a resource using HTTP connections from an unauthorized actor leading to Improper Access Control vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023

CVE-2022-1702

Publication date:
13/05/2022
SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions accept a user-controlled input that specifies a link to an external site and uses that link in a redirect which leads to Open redirection vulnerability.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2022

CVE-2022-1701

Publication date:
13/05/2022
SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions uses a shared and hard-coded encryption key to store data.
Severity CVSS v4.0: Pending analysis
Last modification:
14/10/2022

CVE-2022-22393

Publication date:
13/05/2022
IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.5 , with the adminCenter-1.0 feature configured, could allow an authenticated user to issue a request to obtain the status of HTTP/HTTPS ports which are accessible by the application server. IBM X-Force ID: 222078.
Severity CVSS v4.0: Pending analysis
Last modification:
23/05/2022

CVE-2022-1715

Publication date:
13/05/2022
Account Takeover in GitHub repository neorazorx/facturascripts prior to 2022.07.
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2023

CVE-2022-22325

Publication date:
13/05/2022
IBM MQ (IBM MQ for HPE NonStop 8.1.0) can inadvertently disclose sensitive information under certain circumstances to a local user from a stack trace. IBM X-Force ID: 218853.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-22252

Publication date:
13/05/2022
The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability.
Severity CVSS v4.0: Pending analysis
Last modification:
26/05/2022