Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-44542

Publication date:
01/11/2022
lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash.
Severity CVSS v4.0: Pending analysis
Last modification:
05/05/2025

CVE-2022-43355

Publication date:
01/11/2022
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_service.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-43354

Publication date:
01/11/2022
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/manage_request.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2022-43353

Publication date:
01/11/2022
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/view_order.
Severity CVSS v4.0: Pending analysis
Last modification:
02/05/2025

CVE-2021-27784

Publication date:
31/10/2022
The provided HCL Launch Container images contain non-unique HTTPS certificates and a database encryption key. The fix provides directions and tools to replace the non-unique keys and certificates. This does not affect the standard installer packages.
Severity CVSS v4.0: Pending analysis
Last modification:
02/11/2022

CVE-2022-40292

Publication date:
31/10/2022
<br /> The application allowed for Unauthenticated User Enumeration by interacting with an unsecured endpoint to retrieve information on each account within the system.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-40296

Publication date:
31/10/2022
<br /> The application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-40294

Publication date:
31/10/2022
<br /> The application was identified to have an CSV injection in data export functionality, allowing for malicious code to be embedded within export data and then triggered in exported data viewers.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-40293

Publication date:
31/10/2022
<br /> The application was vulnerable to a session fixation that could be used hijack accounts.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-43752

Publication date:
31/10/2022
Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer&amp;#39;s icon.
Severity CVSS v4.0: Pending analysis
Last modification:
06/05/2025

CVE-2022-40295

Publication date:
31/10/2022
The application was vulnerable to an authenticated information disclosure, allowing administrators to view unsalted user passwords, which could lead to the compromise of plaintext passwords via offline attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2026

CVE-2022-39020

Publication date:
31/10/2022
<br /> Multiple instances of XSS (stored and reflected) was found in the application. For example, features such as student assessment submission, file upload, news, ePortfolio and calendar event creation were found to be vulnerable to cross-site scripting.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
25/10/2023