Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-39028

Publication date:
30/08/2022
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
Severity CVSS v4.0: Pending analysis
Last modification:
27/09/2023

CVE-2022-38118

Publication date:
30/08/2022
OAKlouds Portal website’s Meeting Room has insufficient validation for user input. A remote attacker with general user privilege can perform SQL-injection to access, modify, delete database, perform system operations and disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2022

CVE-2022-25857

Publication date:
30/08/2022
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
Severity CVSS v4.0: Pending analysis
Last modification:
15/03/2024

CVE-2022-25887

Publication date:
30/08/2022
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-25646

Publication date:
30/08/2022
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2022

CVE-2022-25635

Publication date:
30/08/2022
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for broadcast network packet length. An unauthenticated attacker in the adjacent network can exploit this vulnerability to disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
01/09/2022

CVE-2022-26529

Publication date:
30/08/2022
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for segmented packets’ link parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2022

CVE-2022-26528

Publication date:
30/08/2022
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2022

CVE-2022-26527

Publication date:
30/08/2022
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packets’ reference parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
02/09/2022

CVE-2022-38116

Publication date:
30/08/2022
Le-yan Personnel and Salary Management System has hard-coded database account and password within the website source code. An unauthenticated remote attacker can access, modify system data or disrupt service.
Severity CVSS v4.0: Pending analysis
Last modification:
06/09/2022

CVE-2022-24106

Publication date:
30/08/2022
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing the 'interleaved' flag to be changed after the first scan of the image, leading to an unknown integer-related vulnerability in Stream.cc.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2022

CVE-2022-24107

Publication date:
30/08/2022
Xpdf prior to 4.04 lacked an integer overflow check in JPXStream.cc.
Severity CVSS v4.0: Pending analysis
Last modification:
28/10/2022