Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-24840

Publication date:
09/06/2022
django-s3file is a lightweight file upload input for Django and Amazon S3 . In versions prior to 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the `AWS_LOCATION` setting was set, traversal was limited to that location only. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, prior to the release of the patch. The vulnerability has been fixed in version 5.5.1 and above. There is no feasible workaround. We must urge all users to immediately updated to a patched version.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-25804

Publication date:
09/06/2022
An issue was discovered in the IGEL Universal Management Suite (UMS) 6.07.100. Insecure permissions for the serverconfig registry key (under JavaSoft\Prefs\de\igel\rm\config in HKEY_LOCAL_MACHINE\SOFTWARE) allow an unprivileged local attacker to read the encrypted dbuser and dbpassword values for the UMS superuser.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-25805

Publication date:
09/06/2022
An issue was discovered in the IGEL Universal Management Suite (UMS) 6.07.100. The transmission of cleartext LDAP bind credentials by the cmd_mgt_load_mgt_tree command allows an attacker (who can intercept or inspect traffic between an authenticated UMS client and server) to compromise those LDAP bind credentials.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-25806

Publication date:
09/06/2022
An issue was discovered in the IGEL Universal Management Suite (UMS) 6.07.100. A hardcoded DES key in the PrefDBCredentials class allows an attacker, who has discovered encrypted superuser credentials, to decrypt those credentials using a static 8-byte DES key.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-29014

Publication date:
09/06/2022
A local file inclusion vulnerability in Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to read arbitrary files.
Severity CVSS v4.0: Pending analysis
Last modification:
17/06/2022

CVE-2022-29013

Publication date:
09/06/2022
A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-31496

Publication date:
09/06/2022
LibreHealth EHR Base 2.0.0 allows incorrect interface/super/manage_site_files.php access.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-30882

Publication date:
08/06/2022
pyanxdns package in PyPI version 0.2 is vulnerable to code execution backdoor. The impact is: execute arbitrary code (remote). When installing the pyanxdns package of version 0.2, the request package will be installed.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2022-31313

Publication date:
08/06/2022
api-res-py package in PyPI 0.1 is vulnerable to a code execution backdoor in the request package.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2021-40589

Publication date:
08/06/2022
ZAngband zangband-data 2.7.5 is affected by an integer underflow vulnerability in src/tk/plat.c through the variable fileheader.bfOffBits.
Severity CVSS v4.0: Pending analysis
Last modification:
15/06/2022

CVE-2021-40592

Publication date:
08/06/2022
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.
Severity CVSS v4.0: Pending analysis
Last modification:
27/05/2023

CVE-2022-30877

Publication date:
08/06/2022
The keep for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023