Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-1359

Publication date:
17/05/2022
The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2022

CVE-2022-1360

Publication date:
17/05/2022
The affected On-Premise cnMaestro is vulnerable to execution of code on the cnMaestro hosting server. This could allow a remote attacker to change server configuration settings.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2022

CVE-2022-1362

Publication date:
17/05/2022
The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2022

CVE-2022-29162

Publication date:
17/05/2022
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-1356

Publication date:
17/05/2022
cnMaestro is vulnerable to a local privilege escalation. By default, a user does not have root privileges. However, a user can run scripts as sudo, which could allow an attacker to gain root privileges when running user scripts outside allowed commands.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2022

CVE-2022-1357

Publication date:
17/05/2022
The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2022

CVE-2022-1358

Publication date:
17/05/2022
The affected On-Premise is vulnerable to data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate and dump all data held in the cnMaestro database.
Severity CVSS v4.0: Pending analysis
Last modification:
06/06/2022

CVE-2022-30052

Publication date:
17/05/2022
In Home Clean Service System 1.0, the password parameter is vulnerable to SQL injection attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-30054

Publication date:
17/05/2022
In Covid 19 Travel Pass Management 1.0, the code parameter is vulnerable to SQL injection attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-29435

Publication date:
17/05/2022
Cross-Site Request Forgery (CSRF) vulnerability in Alexander Stokmann's Code Snippets Extended plugin
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-29436

Publication date:
17/05/2022
Persistent Cross-Site Scripting (XSS) vulnerability in Alexander Stokmann's Code Snippets Extended plugin
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022

CVE-2022-30045

Publication date:
17/05/2022
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read.
Severity CVSS v4.0: Pending analysis
Last modification:
25/05/2022