Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-40322

Publication date:
11/09/2022
SysAid Help Desk before 22.1.65 allows XSS, aka FR# 66542 and 65579.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-40324

Publication date:
11/09/2022
SysAid Help Desk before 22.1.65 allows XSS via the Linked SRs field, aka FR# 67258.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-40325

Publication date:
11/09/2022
SysAid Help Desk before 22.1.65 allows XSS via the Asset Dashboard, aka FR# 67262.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-26049

Publication date:
11/09/2022
This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution on a target system by exploiting this vulnerability. **Note:** This could have allowed a malicious zip file to extract itself into an arbitrary directory. The only file that Goomph extracts is the p2 bootstrapper and eclipse metadata files hosted at eclipse.org, which are not malicious, so the only way this vulnerability could have affected you is if you had set a custom bootstrap zip, and that zip was malicious.
Severity CVSS v4.0: Pending analysis
Last modification:
16/09/2022

CVE-2022-25295

Publication date:
11/09/2022
This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\example.com, browser will redirect user to http://example.com.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-39135

Publication date:
11/09/2022
Apache Calcite 1.22.0 introduced the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, making them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typically by using Oracle dialect (the first three) or MySQL dialect (the last one), is affected by this vulnerability (the extent of it will depend on the user under which the application is running). From Apache Calcite 1.32.0 onwards, Document Type Declarations and XML External Entity resolution are disabled on the impacted operators.
Severity CVSS v4.0: Pending analysis
Last modification:
06/11/2023

CVE-2022-38266

Publication date:
09/09/2022
An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2023

CVE-2021-37819

Publication date:
09/09/2022
PDF Labs pdftk-java v3.2.3 was discovered to contain an infinite loop via the component /text/pdf/PdfReader.java.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-40320

Publication date:
09/09/2022
cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based buffer over-read.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-36087

Publication date:
09/09/2022
OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-38638

Publication date:
09/09/2022
Casdoor v1.97.3 was discovered to contain an arbitrary file write vulnerability via the fullFilePath parameter at /api/upload-resource.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-36110

Publication date:
09/09/2022
Netmaker makes networks with WireGuard. Prior to version 0.15.1, Improper Authorization functions lead to non-privileged users running privileged API calls. If someone adds users to the Netmaker platform who do not have admin privileges, they can use their auth tokens to run admin-level functions via the API. This problem has been patched in v0.15.1.
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2023