Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-23461

Publication date:
24/09/2022
Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2022

CVE-2022-36025

Publication date:
24/09/2022
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or failure, or if the gas is a negative 64 bit value, the execution will result in a different state root than expected, resulting in a consensus failure in networks with multiple EVM implementations. In networks with a single EVM implementation this can be used to execute with significantly more gas than then transaction requested, possibly exceeding gas limitations. This issue is patched in version 22.7.1. As a workaround, reverting to version 22.1.3 or earlier will prevent incorrect execution.
Severity CVSS v4.0: Pending analysis
Last modification:
28/09/2022

CVE-2022-39242

Publication date:
24/09/2022
Frontier is an Ethereum compatibility layer for Substrate. Prior to commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks -- the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate up the chain gas prices. The impact of this issue is limited in that the spamming attack would still be costly for any adversary, and it has no ability to alter any chain state. This issue has been patched in commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2022

CVE-2022-39240

Publication date:
24/09/2022
MyGraph is a permission management system. Versions prior to 1.0.4 are vulnerable to a storage XSS vulnerability leading to Remote Code Execution. This issue is patched in version 1.0.4. There is no known workaround.
Severity CVSS v4.0: Pending analysis
Last modification:
26/09/2022

CVE-2022-3278

Publication date:
23/09/2022
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-40122

Publication date:
23/09/2022
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/edit_customer_action.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2022-40121

Publication date:
23/09/2022
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search parameter at /net-banking/manage_customers.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2022-40120

Publication date:
23/09/2022
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search_term parameter at /net-banking/customer_transactions.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2022-40119

Publication date:
23/09/2022
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search_term parameter at /net-banking/transactions.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2022-40118

Publication date:
23/09/2022
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds_action.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2022-40117

Publication date:
23/09/2022
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_customer.php.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2022-40116

Publication date:
23/09/2022
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search parameter at /net-banking/beneficiary.php.
Severity CVSS v4.0: Pending analysis
Last modification:
21/05/2025