Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-38529

Publication date:
06/09/2022
tinyexr commit 0647fb3 was discovered to contain a heap-buffer overflow via the component rleUncompress.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2022

CVE-2022-38528

Publication date:
06/09/2022
Open Asset Import Library (assimp) commit 3c253ca was discovered to contain a segmentation violation via the component Assimp::XFileImporter::CreateMeshes.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2022

CVE-2022-35913

Publication date:
06/09/2022
Samourai Wallet Stonewallx2 0.99.98e allows a denial of service via a P2P coinjoin. The attacker and victim must follow each other's paynym. Then, the victim must try to collaborate with the attacker for a Stonewallx2 transaction. Next, the attacker broadcasts a tx, spending the inputs used in Stonewallx2 before the victim can broadcast the collaborative transaction. The attacker does not signal opt in RBF, and uses the lowest fee rate. This would result in the victim being unable to perform Stonewallx2. (Note that the attacker could use multiple paynyms.)
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-37344

Publication date:
06/09/2022
Missing Access Control vulnerability in PHP Crafts Accommodation System plugin
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2022-36387

Publication date:
06/09/2022
Broken Access Control vulnerability in Alessio Caiazza's About Me plugin
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2022-36427

Publication date:
06/09/2022
Missing Access Control vulnerability in About Rentals. Inc. About Rentals plugin
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2023

CVE-2022-36067

Publication date:
06/09/2022
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
08/11/2022

CVE-2022-36663

Publication date:
06/09/2022
Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2022

CVE-2022-36061

Publication date:
06/09/2022
Elrond go is the go implementation for the Elrond Network protocol. In versions prior to 1.3.35, read only calls between contracts can generate smart contracts results. For example, if contract A calls in read only mode contract B and the called function will make changes upon the contract's B state, the state will be altered for contract B as if the call was not made in the read-only mode. This can lead to some effects not designed by the original smart contracts programmers. This issue was patched in version 1.3.35. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
09/09/2022

CVE-2022-38176

Publication date:
06/09/2022
An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.
Severity CVSS v4.0: Pending analysis
Last modification:
01/11/2024

CVE-2022-26859

Publication date:
06/09/2022
Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2022

CVE-2022-26860

Publication date:
06/09/2022
Dell BIOS versions contain a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI to bypass security checks resulting in arbitrary code execution in SMM.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2022