Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-10735

Publication date:
09/09/2022
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2023

CVE-2022-2528

Publication date:
09/09/2022
In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2022

CVE-2022-29061

Publication date:
09/09/2022
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSOAR before 7.2.1 allows an authenticated attacker to execute unauthorized code or commands via crafted HTTP GET requests.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2022

CVE-2022-2925

Publication date:
09/09/2022
Cross-site Scripting (XSS) - Stored in GitHub repository appwrite/appwrite prior to 1.0.0-RC1.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2022

CVE-2022-40305

Publication date:
09/09/2022
A Server-Side Request Forgery issue in Canto Cumulus through 11.1.3 allows attackers to enumerate the internal network, overload network resources, and possibly have unspecified other impact via the server parameter to the /cwc/login login form.
Severity CVSS v4.0: Pending analysis
Last modification:
10/09/2022

CVE-2022-25765

Publication date:
09/09/2022
The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-40307

Publication date:
09/09/2022
An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-40299

Publication date:
09/09/2022
In Singular before 4.3.1, a predictable /tmp pathname is used (e.g., by sdb.cc), which allows local users to gain the privileges of other users via a procedure in a file under /tmp. NOTE: this CVE Record is about sdb.cc and similar files in the Singular interface that have predictable /tmp pathnames; this CVE Record is not about the lack of a safe temporary-file creation capability in the Singular language.
Severity CVSS v4.0: Pending analysis
Last modification:
08/08/2023

CVE-2022-40297

Publication date:
09/09/2022
UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password. NOTE: a third party states "The described attack cannot be executed as demonstrated.
Severity CVSS v4.0: Pending analysis
Last modification:
03/08/2024

CVE-2019-25076

Publication date:
08/09/2022
The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2022

CVE-2022-40280

Publication date:
08/09/2022
An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). createDB in security/provisioning/src/provisioningdatabasemanager.c has a missing sqlite3_close after sqlite3_open_v2, leading to a denial of service.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2022

CVE-2022-40281

Publication date:
08/09/2022
An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). cyassl_connect_step2 in curl/vtls/cyassl.c has a missing X509_free after SSL_get_peer_certificate, leading to information disclosure.
Severity CVSS v4.0: Pending analysis
Last modification:
13/09/2022