Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-44136

Publication date:
30/11/2022
Zenario CMS 9.3.57186 is vulnerable to Remote Code Excution (RCE).
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2021-31740

Publication date:
30/11/2022
SEPPMail's web frontend, user input is not embedded correctly in the web page and therefore leads to cross-site scripting vulnerabilities (XSS).
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025

CVE-2022-1606

Publication date:
30/11/2022
Incorrect privilege assignment in M-Files Server versions before 22.3.11164.0 and before 22.3.11237.1 allows user to read unmanaged objects.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2022-1911

Publication date:
30/11/2022
Error in parser function in M-Files Server versions before 22.6.11534.1 and before 22.6.11505.0 allowed unauthenticated access to some information of the underlying operating system.
Severity CVSS v4.0: Pending analysis
Last modification:
23/02/2026

CVE-2022-38801

Publication date:
30/11/2022
In Zkteco BioTime
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2022-38802

Publication date:
30/11/2022
Zkteco BioTime
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2022-38803

Publication date:
30/11/2022
Zkteco BioTime
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2021-4242

Publication date:
30/11/2022
A vulnerability was found in Sapido BR270n, BRC76n, GR297 and RB1732 and classified as critical. Affected by this issue is some unknown functionality of the file ip/syscmd.htm. The manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214592.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-45842

Publication date:
30/11/2022
Unauth. Race Condition vulnerability in WP ULike Plugin
Severity CVSS v4.0: Pending analysis
Last modification:
14/03/2025

CVE-2022-26366

Publication date:
30/11/2022
Cross-Site Request Forgery (CSRF) in AdRotate Banner Manager Plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-24441

Publication date:
30/11/2022
The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as ‘trusted’ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected:
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2022-22984

Publication date:
30/11/2022
The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.
Severity CVSS v4.0: Pending analysis
Last modification:
25/04/2025