Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-42328

Publication date:
07/12/2022
Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45917

Publication date:
07/12/2022
ILIAS before 7.16 has an Open Redirect.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45916

Publication date:
07/12/2022
ILIAS before 7.16 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45915

Publication date:
07/12/2022
ILIAS before 7.16 allows OS Command Injection.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-3643

Publication date:
07/12/2022
Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.
Severity CVSS v4.0: Pending analysis
Last modification:
29/11/2023

CVE-2022-45918

Publication date:
07/12/2022
ILIAS before 7.16 allows External Control of File Name or Path.
Severity CVSS v4.0: Pending analysis
Last modification:
09/02/2024

CVE-2022-42699

Publication date:
06/12/2022
Auth. Remote Code Execution vulnerability in Easy WP SMTP plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-44030

Publication date:
06/12/2022
Redmine 5.x before 5.0.4 allows downloading of file attachments of any Issue or any Wiki page due to insufficient permission checks. Depending on the configuration, this may require login as a registered user.
Severity CVSS v4.0: Pending analysis
Last modification:
23/04/2025

CVE-2022-45833

Publication date:
06/12/2022
Auth. Path Traversal vulnerability in Easy WP SMTP plugin
Severity CVSS v4.0: Pending analysis
Last modification:
08/12/2022

CVE-2022-45829

Publication date:
06/12/2022
Auth. Path Traversal vulnerability in Easy WP SMTP plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-45816

Publication date:
06/12/2022
Auth. Stored Cross-Site Scripting (XSS) vulnerability in GD bbPress Attachments plugin
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-41910

Publication date:
06/12/2022
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have patched the issue in GitHub commit a65411a1d69edfb16b25907ffb8f73556ce36bb7. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.8.4, 2.9.3, and 2.10.1.
Severity CVSS v4.0: Pending analysis
Last modification:
08/12/2022